Sciweavers

533 search results - page 4 / 107
» Control flow based obfuscation
Sort
View
ENTCS
2006
126views more  ENTCS 2006»
13 years 5 months ago
An Applicative Control-Flow Graph Based on Huet's Zipper
We are using ML to build a compiler that does low-level optimization. To support optimizations in classic imperative style, we built a control-flow graph using mutable pointers an...
Norman Ramsey, João Dias

Publication
165views
15 years 3 months ago
A Timeout Based Congestion Control Scheme for Window Flow- Controlled Networks
During overload, most networks drop packets due to buffer unavailability. The resulting timeouts at the source provide an implicit mechanism to convey congestion signals from the n...
R. Jain
SEC
2007
13 years 6 months ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
WSC
2004
13 years 6 months ago
Design Specifications of a Generic Supply Chain Simulator
This paper describes a design specification for a generic, supply-chain-simulation system. The proposed simulation system is based on schedule-driven and stock-driven control meth...
Shigeki Umeda, Y. Tina Lee
AICCSA
2001
IEEE
103views Hardware» more  AICCSA 2001»
13 years 9 months ago
Seamless Integration of Control Flow and Data Flow in a Visual Language
In the visual programming domain, the stress of research is laid on the use of visual formalism, which is considered to be more intuitive than the textual formalism, in the progra...
Honitriniela Randriamparany, Bertrand Ibrahim