Sciweavers

684 search results - page 133 / 137
» Reverse Engineering CAPTCHAs
Sort
View
CASES
2004
ACM
15 years 3 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
86
Voted
CHI
2003
ACM
15 years 2 months ago
Breakingstory: visualizing change in online news
BreakingStory is an interactive system for visualizing change in online news. The system regularly collects the text from the front pages of international daily news web sites. It...
Jean Anne Fitzpatrick, James Reffell, Moryma Aydel...
NSPW
2003
ACM
15 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
BTW
2003
Springer
103views Database» more  BTW 2003»
15 years 2 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
COOPIS
2002
IEEE
15 years 2 months ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai