Sciweavers

848 search results - page 103 / 170
» Understanding Obfuscated Code
Sort
View
VAMOS
2010
Springer
15 years 2 days ago
The Variability Model of The Linux Kernel
Lack of realistic benchmarks hinders efficient design and evaluation of analysis techniques for feature models. We extract a variability model from the code base of the Linux kerne...
Steven She, Rafael Lotufo, Thorsten Berger, Andrze...
IACR
2011
110views more  IACR 2011»
14 years 1 months ago
Decoding One Out of Many
Generic decoding of linear codes is the best known attack against most code-based cryptosystems. Understanding and measuring the complexity of the best decoding technique is thus n...
Nicolas Sendrier
CSFW
2012
IEEE
13 years 4 months ago
Information-Flow Security for a Core of JavaScript
—Tracking information flow in dynamic languages remains an important and intricate problem. This paper makes substantial headway toward understanding the main challenges and res...
Daniel Hedin, Andrei Sabelfeld
BIOINFORMATICS
2012
13 years 4 months ago
Epigenetic priors for identifying active transcription factor binding sites
Motivation Accurate knowledge of the genome-wide binding of transcription factors in a particular cell type or under a particular condition is necessary for understanding transcri...
Gabriel Cuellar-Partida, Fabian A. Buske, Robert C...
CC
2009
Springer
116views System Software» more  CC 2009»
16 years 2 months ago
A Framework for Exploring Optimization Properties
Important challenges for compiler optimization include determining what optimizations to apply, where to apply them and what is a good sequence in which to apply them. To address t...
Min Zhao, Bruce R. Childers, Mary Lou Soffa