咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 17 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
    • 1 篇 核科学与技术
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 文学

主题

  • 24 篇 executable code
  • 4 篇 language
  • 3 篇 codes
  • 3 篇 legal executions
  • 2 篇 runtime
  • 2 篇 algorithms
  • 2 篇 end users
  • 2 篇 reverse engineer...
  • 2 篇 refining
  • 2 篇 verification
  • 2 篇 microsoft window...
  • 1 篇 conferences
  • 1 篇 state machines
  • 1 篇 macros
  • 1 篇 scalability
  • 1 篇 access control
  • 1 篇 mercury
  • 1 篇 active nodes
  • 1 篇 frameworks
  • 1 篇 uml

机构

  • 1 篇 imag lab grenobl...
  • 1 篇 microsoft
  • 1 篇 univ maryland de...
  • 1 篇 st petersburg na...
  • 1 篇 univ colorado bo...
  • 1 篇 univ innsbruck i...
  • 1 篇 software verific...
  • 1 篇 inria rennes ren...
  • 1 篇 virtual vehicle ...
  • 1 篇 inserm u968 f-75...
  • 1 篇 soloviev rybinsk...
  • 1 篇 etri network sec...
  • 1 篇 psl res univ min...
  • 1 篇 brunel univ dept...
  • 1 篇 beijing jiaotong...
  • 1 篇 etri informat se...
  • 1 篇 isfahan univ tec...
  • 1 篇 npp satek plus l...
  • 1 篇 columbia univ de...
  • 1 篇 iit kanpur kanpu...

作者

  • 1 篇 karner michael
  • 1 篇 kim ikkyun
  • 1 篇 gu dawu
  • 1 篇 baradaran sara
  • 1 篇 talpin jean-pier...
  • 1 篇 naygandhi hiren
  • 1 篇 han kijun
  • 1 篇 duda a
  • 1 篇 elwazeer khaled
  • 1 篇 keromytis angelo...
  • 1 篇 ethan jackson
  • 1 篇 vivek gupta
  • 1 篇 heidari mahdi
  • 1 篇 zhang yuanyuan
  • 1 篇 ding zhijun
  • 1 篇 kang koohong
  • 1 篇 wang junli
  • 1 篇 kamali ali
  • 1 篇 bernd fischer
  • 1 篇 stefan warwas

语言

  • 24 篇 英文
检索条件"主题词=Executable Code"
24 条 记 录,以下是11-20 订阅
排序:
A Stack Memory Abstraction and Symbolic Analysis Framework for executables
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2016年 第2期25卷 1–38页
作者: Anand, Kapil Elwazeer, Khaled Kotha, Aparna Smithson, Matthew Barua, Rajeev Keromytis, Angelos Univ Maryland Dept Elect & Comp Engn College Pk MD USA Columbia Univ Dept Comp Sci New York NY 10027 USA
This article makes three contributions regarding reverse-engineering of executables. First, techniques are presented for recovering a precise and correct stack-memory model in executables while addressing executable-s... 详细信息
来源: 评论
Towards Refinement Types for Time-Dependent Data-Flow Networks  15
Towards Refinement Types for Time-Dependent Data-Flow Networ...
收藏 引用
2015 ACM/IEEE International Conference on Formal Methods and Models for codesign (MEMOcode)
作者: Talpin, Jean-Pierre Jouvelot, Pierre Shukla, Sandeep Kumar INRIA Rennes Rennes France PSL Res Univ MINES ParisTech Paris France IIT Kanpur Kanpur Uttar Pradesh India
The concept of liquid clocks introduced in this paper is a significant step towards a more precise compile-time framework for the analysis of synchronous and polychromous languages. Compiling languages such as Lustre ... 详细信息
来源: 评论
A secure method for transferring active packet using digital signature schemes  10
A secure method for transferring active packet using digital...
收藏 引用
10th International Conference on Telecommunications (ICT 2003)
作者: Kim, Y Na, J Sohn, S ETRI Network Secur Dept Informat Secur Technol Div Yuseong Gu Taejon 305350 South Korea
Active networks represent a new approach to network architecture. Active networks provide a much more flexible network infrastructure than traditional networks do. Flexibility is a powerful merit of active networks, b... 详细信息
来源: 评论
Android App Protection via Interpretation Obfuscation  12
Android App Protection via Interpretation Obfuscation
收藏 引用
IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)
作者: Shu, Junliang Li, Juanru Zhang, Yuanyuan Gu, Dawu Shanghai Jiao Tong Univ Lab Cryptol & Comp Secur Shanghai 200030 Peoples R China
To protect Android app from malicious reproduction or tampering, code obfuscation techniques are introduced to increase the difficulty of reverse engineering and program understanding. Current obfuscation schemes focu... 详细信息
来源: 评论
System Design for Enhanced Forward-Engineering Possibilities of Safety Critical Embedded Systems  17
System Design for Enhanced Forward-Engineering Possibilities...
收藏 引用
IEEE 17th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)
作者: Krammer, Martin Karner, Michael Fuchs, Anton Virtual Vehicle Res Ctr Graz Austria
Due to the high overall complexity of embedded systems in the automotive domain, the concept and system design phases have shown to be important, as they lay the foundations for implementations. Therefore, front-loadi... 详细信息
来源: 评论
Application of two executable computer codes for confidence intervals, decision levels and detection limits when the sample is counted an integer times equal to or greater than the blank
收藏 引用
JOURNAL OF RADIOANALYTICAL AND NUCLEAR CHEMISTRY 2013年 第1期296卷 31-35页
作者: Potter, W. E. Strzelczyk, J. Univ Colorado Hosp Aurora CO 80045 USA
Poisson statistics are utilized throughout. The ratio of the sample count time to the blank count time is taken to be an integer. The expected blank count in the sample count time is assumed either known or well known... 详细信息
来源: 评论
Interval expressions - A functional model for interactive dynamic multimedia presentations
Interval expressions - A functional model for interactive dy...
收藏 引用
International Conference on Multimedia Computing and Systems
作者: Keramane, C Duda, A IMAG LAB GRENOBLE LSRF-38041 GRENOBLE 9FRANCE
We propose a new model for structured temporal composition of interactive dynamic multimedia presentations. It extends the notion of basic media segments to include executable code, live feeds, and links. The model is... 详细信息
来源: 评论
Non-Intrusive Documentation-Driven Integration Testing  8
Non-Intrusive Documentation-Driven Integration Testing
收藏 引用
8th IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
作者: Haeser, Florian Breu, Ruth Univ Innsbruck Inst Comp Sci Qual Engn A-6020 Innsbruck Austria
Powerful development frameworks and adoption of agile development methods are continuously increasing release frequency, thus compress test cycles. Test automation, often relying on model based approaches, helps to re... 详细信息
来源: 评论
Automatic Derivation of Statistical Algorithms: The EM Family and Beyond  02
Automatic Derivation of Statistical Algorithms: The EM Famil...
收藏 引用
Annual Conference on Neural Information Processing Systems
作者: Alexander G. Gray Bernd Fischer Johann Schumann Wray Buntine Carnegie Mellon University
Machine learning has reached a point where many probabilistic methods can be understood as variations, extensions and combinations of a much smaller set of abstract themes, e.g., as different instances of the EM algor... 详细信息
来源: 评论
Automating Uncompressing and Static Analysis of Conficker Worm
Automating Uncompressing and Static Analysis of Conficker Wo...
收藏 引用
IEEE Malaysia International Conference on Communications
作者: Lee Ling Chuan Chan Lee Yee Mahamod Ismail Kasmiran Jumari Faculty of Engineering & Built Environment Universiti Kebangsaan Malaysia
The infamous computer worm, Conficker, which targeting the Microsoft Windows operating system, was literally over the media. This malicious worm used modern malware technique, where it hide its malicious portion of th... 详细信息
来源: 评论