Sciweavers

7393 search results - page 1206 / 1479
» Synthesis-for-testability using transformations
Sort
View
127
Voted
TCC
2007
Springer
96views Cryptology» more  TCC 2007»
15 years 10 months ago
Securely Obfuscating Re-encryption
Abstract. We present the first positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known negative impossibil...
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, V...
WER
2007
Springer
15 years 10 months ago
Exploiting a Goal-Decomposition Technique to Prioritize Non-functional Requirements
Business stakeholders need to have clear and realistic goals if they want to meet commitments in application development. As a consequence, at early stages they prioritize require...
Maya Daneva, Mohamad Kassab, María Laura Po...
ACSAC
2006
IEEE
15 years 10 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
AHS
2006
IEEE
164views Hardware» more  AHS 2006»
15 years 10 months ago
Automatic Hybrid Genetic Algorithm Based Printed Circuit Board Inspection
The paper presents a novel integrated system in which a number of image processing algorithm are embedded within a Genetic Algorithm (GA) based framework in order to provide an ad...
Syamsiah Mashohor, Jonathan R. Evans, Ahmet T. Erd...
APSEC
2006
IEEE
15 years 10 months ago
Adopting Model-Driven Development for Integrated Services and Appliances in Home Network Systems
The technology of a home network system (HNS) allows integration of several kinds of home appliances to provide a user with value-added integrated services. Development of the int...
Hiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumo...
« Prev « First page 1206 / 1479 Last » Next »