Sciweavers

848 search results - page 91 / 170
» Understanding Obfuscated Code
Sort
View
125
Voted
INFOSCALE
2006
ACM
15 years 8 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
143
Voted
VISSOFT
2005
IEEE
15 years 7 months ago
Interactive Exploration of Semantic Clusters
Using visualization and exploration tools can be of great use for the understanding of a software system when only its source code is available. However, understanding a large sof...
Mircea Lungu, Adrian Kuhn, Tudor Gîrba, Mich...
WSE
2003
IEEE
15 years 7 months ago
Using Keyword Extraction for Web Site Clustering
Reverse engineering techniques have the potential to support Web site understanding, by providing views that show the organization of a site and its navigational structure. Howeve...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...
GI
2009
Springer
15 years 6 months ago
Massively-Parallel Simulation of Biochemical Systems
: Understanding biological evolution prompts for a detailed understanding of the realized phenotype. Biochemical and gene regulatory dynamics are a cornerstone for the physiology o...
Jens Ackermann, Paul Baecher, Thorsten Franzel, Mi...
ASWEC
2000
IEEE
15 years 6 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt