Sciweavers

2572 search results - page 89 / 515
» codes 2008
Sort
View
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
15 years 5 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
187
Voted
DAM
2007
72views more  DAM 2007»
15 years 3 months ago
Binary templates for comma-free DNA codes
Arita and Kobayashi proposed a method for constructing comma-free DNA codes using binary templates, and showed that the separation d of any such binary template of length n satisï...
Oliver D. King, Philippe Gaborit
123
Voted
CSMR
2008
IEEE
15 years 10 months ago
JDeodorant: Identification and Removal of Type-Checking Bad Smells
In this demonstration, we present an Eclipse plug-in that automatically identifies Type-Checking bad smells in Java source code, and resolves them by applying the “Replace Condi...
Nikolaos Tsantalis, Theodoros Chaikalis, Alexander...
125
Voted
IJNSEC
2008
83views more  IJNSEC 2008»
15 years 3 months ago
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
In this paper we present a novel dynamic verification approach to protect the local host confidentiality from malicious Java mobile code. In our approach we use Bytecode Modificat...
Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru ...
125
Voted
DKE
2007
115views more  DKE 2007»
15 years 3 months ago
An improved methodology on information distillation by mining program source code
This paper presents a methodology for knowledge acquisition from source code. We use data mining to support semiautomated software maintenance and comprehension and provide practi...
Yiannis Kanellopoulos, Christos Makris, Christos T...