Sciweavers

1027 search results - page 81 / 206
» Callgraph properties of executables
Sort
View
101
Voted
POPL
1999
ACM
15 years 5 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson
95
Voted
LOPSTR
1999
Springer
15 years 5 months ago
Annotations for Prolog - A Concept and Runtime Handling
Abstract. A concept of annotations for rendering procedural aspects of Prolog is presented, built around wellknown procedural concepts of Standard Prolog. Annotations describe prop...
Marija Kulas
CSFW
2010
IEEE
15 years 4 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
99
Voted
CCS
2006
ACM
15 years 4 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
96
Voted
EUROGP
2010
Springer
160views Optimization» more  EUROGP 2010»
15 years 4 months ago
Fine-Grained Timing Using Genetic Programming
In previous work, we have demonstrated that it is possible to use Genetic Programming to minimise the resource consumption of software, such as its power consumption or execution t...
David Robert White, Juan E. Tapiador, Julio C&eacu...