Sciweavers

3456 search results - page 35 / 692
» Byte Code Engineering
Sort
View
ESORICS
2011
Springer
13 years 11 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
CODES
2000
IEEE
15 years 4 months ago
Software performance estimation strategies in a system-level design tool
À ¹Ð Ú Ð Óר Ò Ô Ö ÓÖÑ Ò ×Ø Ñ Ø ÓÒ¸ ÓÙÔÐ Û Ø ×Ø Ö Û Ö »×Ó ØÛ Ö Ó¹× ÑÙÐ Ø ÓÒ Ö Ñ ÛÓÖ ¸ × Ý Ò Ð Ö ØÓ ר Ñ ×Ýר Ñ...
Jwahar R. Bammi, Wido Kruijtzer, Luciano Lavagno, ...
CODES
1999
IEEE
15 years 4 months ago
Designing digital video systems: modeling and scheduling
H. J. H. N. Kenter, Claudio Passerone, W. J. M. Sm...
CODES
1998
IEEE
15 years 4 months ago
Energy-conscious HW/SW-partitioning of embedded systems: a case study on an MPEG-2 encoder
Energy dissipationis a hot topic in the design of
Jörg Henkel, Yanbing Li
CODES
1998
IEEE
15 years 4 months ago
Modeling reactive systems in Java
Claudio Passerone, Roberto Passerone, Claudio Sans...