Sciweavers

533 search results - page 96 / 107
» Control flow based obfuscation
Sort
View
JIPS
2007
100views more  JIPS 2007»
14 years 11 months ago
Static Type Assignment for SSA Form in CTOC
: Although the Java bytecode has numerous advantages, it also has certain shortcomings such as its slow execution speed and difficulty of analysis. In order to overcome such disadv...
Ki-Tae Kim, Weon-Hee Yoo
92
Voted
CCR
2004
62views more  CCR 2004»
14 years 11 months ago
Methodological frameworks for large-scale network analysis and design
This paper emphasizes the need for methodological frameworks for analysis and design of large scale networks which are independent of specific design innovations and their advocac...
Antonis Papachristodoulou, Lun Li, John C. Doyle
79
Voted
ENVSOFT
2000
70views more  ENVSOFT 2000»
14 years 11 months ago
Modeling soil pile bioremediation
A model is presented for the analysis of bioremediation applied to an ex situ soil pile. The approach is based on the remediation of a pile containing the contaminated soil, which...
Fehmidakhatun A. Mesania, Aaron A. Jennings
JVCA
2002
180views more  JVCA 2002»
14 years 11 months ago
A programming environment for behavioural animation
Behavioural models offer the ability to simulate autonomous agents like organisms and living beings. Psychological studies have showed that the human behaviour can be described by...
Frédéric Devillers, Stéphane ...
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
14 years 9 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...