Sciweavers

2572 search results - page 379 / 515
» codes 2008
Sort
View
106
Voted
CAL
2007
15 years 1 months ago
Dynamic Predication of Indirect Jumps
Abstract—Indirect jumps are used to implement increasinglycommon programming language constructs such as virtual function calls, switch-case statements, jump tables, and interfac...
José A. Joao, Onur Mutlu, Hyesoon Kim, Yale...
108
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 1 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
132
Voted
IJNSEC
2008
190views more  IJNSEC 2008»
15 years 1 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
106
Voted
IJSWIS
2008
126views more  IJSWIS 2008»
15 years 1 months ago
Bringing Semantic Services to Real-World Objects
The last few years have seen the emergence of two parallel trends: the first of such trends is set by technologies such as Near Field Communication, 2D Bar codes and RFID that supp...
Massimo Paolucci, Gregor Broll, John Hamard, Enric...
106
Voted
INFSOF
2008
118views more  INFSOF 2008»
15 years 1 months ago
MARS: A metamodel recovery system using grammar inference
Domain-specific modeling (DSM) assists subject matter experts in describing the essential characteristics of a problem in their domain. Various software artifacts can be generated...
Faizan Javed, Marjan Mernik, Jeff Gray, Barrett R....