Sciweavers

10055 search results - page 1757 / 2011
» Structured programming using processes
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
ACSC
2006
IEEE
15 years 8 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
112
Voted
ESCIENCE
2006
IEEE
15 years 8 months ago
TextGrid and eHumanities
TextGrid is a new Grid project in the framework of the German D-Grid initiative, with the aim to deploy Grid technologies for humanities scholars working on historical (German) te...
Peter Gietz, Andreas Aschenbrenner, Stefan Bü...
115
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Multi-Stage Investment Decision under Contingent Demand for Networking Planning
Telecommunication companies, such as Internet and cellular service providers, are seeing rapid and uncertain growth of traffic routed through their networks. It has become a chall...
Miguel F. Anjos, Michael Desroches, Anwar Haque, O...
ISESE
2006
IEEE
15 years 8 months ago
Predicting component failures at design time
How do design decisions impact the quality of the resulting software? In an empirical study of 52 ECLIPSE plug-ins, we found that the software design as well as past failure histo...
Adrian Schröter, Thomas Zimmermann, Andreas Z...
« Prev « First page 1757 / 2011 Last » Next »