Sciweavers

3456 search results - page 35 / 692
» Byte Code Engineering
Sort
View
196
Voted
ESORICS
2011
Springer
14 years 1 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
CODES
2000
IEEE
15 years 6 months ago
Software performance estimation strategies in a system-level design tool
À ¹Ð Ú Ð Óר Ò Ô Ö ÓÖÑ Ò ×Ø Ñ Ø ÓÒ¸ ÓÙÔÐ Û Ø ×Ø Ö Û Ö »×Ó ØÛ Ö Ó¹× ÑÙÐ Ø ÓÒ Ö Ñ ÛÓÖ ¸ × Ý Ò Ð Ö ØÓ ר Ñ ×Ýר Ñ...
Jwahar R. Bammi, Wido Kruijtzer, Luciano Lavagno, ...
71
Voted
CODES
1999
IEEE
15 years 6 months ago
Designing digital video systems: modeling and scheduling
H. J. H. N. Kenter, Claudio Passerone, W. J. M. Sm...
94
Voted
CODES
1998
IEEE
15 years 6 months ago
Energy-conscious HW/SW-partitioning of embedded systems: a case study on an MPEG-2 encoder
Energy dissipationis a hot topic in the design of
Jörg Henkel, Yanbing Li
86
Voted
CODES
1998
IEEE
15 years 6 months ago
Modeling reactive systems in Java
Claudio Passerone, Roberto Passerone, Claudio Sans...