Sciweavers

3092 search results - page 474 / 619
» Where are you pointing
Sort
View
WCRE
2010
IEEE
13 years 8 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WG
2010
Springer
13 years 8 months ago
Generalized Graph Clustering: Recognizing (p, q)-Cluster Graphs
Cluster Editing is a classical graph theoretic approach to tackle the problem of data set clustering: it consists of modifying a similarity graph into a disjoint union of cliques,...
Pinar Heggernes, Daniel Lokshtanov, Jesper Nederlo...
WIOPT
2010
IEEE
13 years 8 months ago
On the optimal design of MAC protocols in multi-hop ad hoc networks
Abstract—In this paper, we present our results on the performance of MAC protocols in multi-hop wireless ad hoc networks in terms of the newly proposed metric “aggregate multi-...
Mariam Kaynia, Pedro H. J. Nardell, Paulo Cardieri...
XPU
2010
Springer
13 years 8 months ago
Towards Understanding Communication Structure in Pair Programming
Pair Programming has often been reported to be beneficial in software projects. To better understand where these benefits come from we evaluate the aspect of intra-pair communica...
Kai Stapel, Eric Knauss, Kurt Schneider, Matthias ...
EGH
2010
Springer
13 years 8 months ago
Real time volumetric shadows using polygonal light volumes
This paper presents a more efficient way of computing single scattering effects in homogeneous participating media for real-time purposes than the currently popular ray-marching b...
Markus Billeter, Erik Sintorn, Ulf Assarsson