Sciweavers

3107 search results - page 278 / 622
» Error-Correcting Source Code
Sort
View
NDSS
2008
IEEE
15 years 11 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
GLOBECOM
2007
IEEE
15 years 10 months ago
Relay Selection for Low-Complexity Coded Cooperation
— This paper explores relay selection and selection diversity for coded cooperation in wireless sensor networks, with complexity constraints for the sensor nodes. In previous wor...
Josephine P. K. Chu, Raviraj S. Adve, Andrew W. Ec...
ISESE
2005
IEEE
15 years 10 months ago
A comparative study on the re-documentation of existing software: code annotations vs. drawing editors
During software evolution, programmers spend a lot of time and effort in the comprehension of the internal code structure. Such an activity is often required because the available...
Marco Torchiano, Filippo Ricca, Paolo Tonella
SAS
2005
Springer
134views Formal Methods» more  SAS 2005»
15 years 10 months ago
Using Dependent Types to Certify the Safety of Assembly Code
There are many source-level analyses or instrumentation tools that enforce various safety properties. In this paper we present an infrastructure that can be used to check independe...
Matthew Harren, George C. Necula
ER
2003
Springer
150views Database» more  ER 2003»
15 years 9 months ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...