A Software Obfuscation Method Based on Stack-State Transition Graph

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Graph Grammar Engineering: A Software Specification Method

Graphs as conceptual data models are accepted and used in a wide range of different problem areas. Giving some examples we outline common aspects for modeling complex structures by graphs. We present a formal frame-work based on graph grammars to specify graph classes and the corresponding graph manipulations. We show that such a specification can be written in a systematic, engineering-like ma...

متن کامل

Simulation of a Microgripper with Electrothermal Actuator Using COMSOL Software Based on the Finite Element Method

Micro-electro-mechanical systems (MEMs) are Combination of electrical and mechanical components in Micron dimensions. In recent years, holding, actuating methods and handling of MEMs components such as microgripper, microsensors and etc. have been deeply studied. Microgrippers for handling, positioning and assembling of micro components are very useful so that for clamping need actuation create...

متن کامل

Simulation of a Microgripper with Electrothermal Actuator Using COMSOL Software Based on the Finite Element Method

Micro-electro-mechanical systems (MEMs) are Combination of electrical and mechanical components in Micron dimensions. In recent years, holding, actuating methods and handling of MEMs components such as microgripper, microsensors and etc. have been deeply studied. Microgrippers for handling, positioning and assembling of micro components are very useful so that for clamping need actuation create...

متن کامل

A method for identifying software components based on Non-dominated Sorting Genetic Algorithm

Identifying the appropriate software components in the software design phase is a vital task in the field of software engineering and is considered as an important way to increase the software maintenance capability. Nowadays, many methods for identifying components such as graph partitioning and clustering are presented, but most of these methods are based on expert opinion and have poor accur...

متن کامل

Protecting Genomic Privacy by a Sequence-Similarity Based Obfuscation Method

In the post-genomic era, large-scale personal DNA sequences are produced and collected for genetic medical diagnoses and new drug discovery, which, however, simultaneously poses serious challenges to the protection of personal genomic privacy. Existing genomic privacy-protection methods are either time-consuming or with low accuracy. To tackle these problems, this paper proposes a sequence simi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energy Procedia

سال: 2011

ISSN: 1876-6102

DOI: 10.1016/j.egypro.2011.11.005