Sciweavers

2081 search results - page 92 / 417
» codes 2006
Sort
View
ADAEUROPE
2006
Springer
15 years 5 months ago
Bauhaus - A Tool Suite for Program Analysis and Reverse Engineering
The maintenance and evolution of critical software with high requirements for reliability is an extremely demanding, time consuming and expensive task. Errors introduced by ad-hoc ...
Aoun Raza, Gunther Vogel, Erhard Plödereder
CHINZ
2006
ACM
15 years 5 months ago
RCA: experiences with an IDE annotation tool
Ink annotation is a common method for recording feedback on a paper document. However, reviewing code on paper is difficult due to its non-linear nature. This project extends exis...
Richard Priest, Beryl Plimmer
WS
2006
ACM
15 years 5 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
ICCAD
2006
IEEE
122views Hardware» more  ICCAD 2006»
15 years 8 months ago
Network coding for routability improvement in VLSI
With the standard approach for establishing multicast connections over a network, network nodes are utilized to forward and duplicate the packets received over the incoming links....
Nikhil Jayakumar, Sunil P. Khatri, Kanupriya Gulat...
ACSC
2006
IEEE
15 years 6 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson