Sciweavers

848 search results - page 86 / 170
» Understanding Obfuscated Code
Sort
View
GSN
2009
Springer
155views Sensor Networks» more  GSN 2009»
15 years 6 months ago
Distributed Network Configuration for Wavelet-Based Compression in Sensor Networks
En-route data compression is fundamental to reduce the power consumed for data gathering in sensor networks. Typical in-network compression schemes involve the distributed computat...
Paula Tarrío, Giuseppe Valenzise, Godwin Sh...
WCRE
1997
IEEE
15 years 5 months ago
Reverse Engineering is Reverse Forward Engineering
Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering per...
Ira D. Baxter, Michael Mehlich
ECIS
2001
15 years 3 months ago
Knowledge integration processes within the context of enterprise resources planning (ERP) systems implementation
The empirical findings from an organization, which adopted and implemented ERP, are presented. The focus of this empirical research was to understand the nature and processes of k...
Jimmy C. Huang, Sue Newell, Shan Ling Pan, Robert ...
FGCS
2006
113views more  FGCS 2006»
15 years 2 months ago
Performance feature identification by comparative trace analysis
This work introduces a method for instrumenting applications, producing execution traces, and visualizing multiple trace instances to identify performance features. The approach p...
Daniel P. Spooner, Darren J. Kerbyson
COMSIS
2007
128views more  COMSIS 2007»
15 years 2 months ago
Constructing program animations using a pattern-based approach
The aim of this paper is to discuss how our pattern-based strategy for the visualization of data and control flow can effectively be used to animate the program and exhibit its beh...
Daniela Carneiro da Cruz, Pedro Rangel Henriques, ...