Sciweavers

848 search results - page 91 / 170
» Understanding Obfuscated Code
Sort
View
INFOSCALE
2006
ACM
15 years 10 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
VISSOFT
2005
IEEE
15 years 10 months ago
Interactive Exploration of Semantic Clusters
Using visualization and exploration tools can be of great use for the understanding of a software system when only its source code is available. However, understanding a large sof...
Mircea Lungu, Adrian Kuhn, Tudor Gîrba, Mich...
WSE
2003
IEEE
15 years 10 months ago
Using Keyword Extraction for Web Site Clustering
Reverse engineering techniques have the potential to support Web site understanding, by providing views that show the organization of a site and its navigational structure. Howeve...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...
GI
2009
Springer
15 years 9 months ago
Massively-Parallel Simulation of Biochemical Systems
: Understanding biological evolution prompts for a detailed understanding of the realized phenotype. Biochemical and gene regulatory dynamics are a cornerstone for the physiology o...
Jens Ackermann, Paul Baecher, Thorsten Franzel, Mi...
ASWEC
2000
IEEE
15 years 9 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt