A Software Obfuscation Method Based on Stack-State Transition Graph
نویسندگان
چکیده
منابع مشابه
Graph Grammar Engineering: A Software Specification Method
Graphs as conceptual data models are accepted and used in a wide range of different problem areas. Giving some examples we outline common aspects for modeling complex structures by graphs. We present a formal frame-work based on graph grammars to specify graph classes and the corresponding graph manipulations. We show that such a specification can be written in a systematic, engineering-like ma...
متن کاملSimulation of a Microgripper with Electrothermal Actuator Using COMSOL Software Based on the Finite Element Method
Micro-electro-mechanical systems (MEMs) are Combination of electrical and mechanical components in Micron dimensions. In recent years, holding, actuating methods and handling of MEMs components such as microgripper, microsensors and etc. have been deeply studied. Microgrippers for handling, positioning and assembling of micro components are very useful so that for clamping need actuation create...
متن کاملSimulation of a Microgripper with Electrothermal Actuator Using COMSOL Software Based on the Finite Element Method
Micro-electro-mechanical systems (MEMs) are Combination of electrical and mechanical components in Micron dimensions. In recent years, holding, actuating methods and handling of MEMs components such as microgripper, microsensors and etc. have been deeply studied. Microgrippers for handling, positioning and assembling of micro components are very useful so that for clamping need actuation create...
متن کاملA method for identifying software components based on Non-dominated Sorting Genetic Algorithm
Identifying the appropriate software components in the software design phase is a vital task in the field of software engineering and is considered as an important way to increase the software maintenance capability. Nowadays, many methods for identifying components such as graph partitioning and clustering are presented, but most of these methods are based on expert opinion and have poor accur...
متن کاملProtecting Genomic Privacy by a Sequence-Similarity Based Obfuscation Method
In the post-genomic era, large-scale personal DNA sequences are produced and collected for genetic medical diagnoses and new drug discovery, which, however, simultaneously poses serious challenges to the protection of personal genomic privacy. Existing genomic privacy-protection methods are either time-consuming or with low accuracy. To tackle these problems, this paper proposes a sequence simi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Procedia
سال: 2011
ISSN: 1876-6102
DOI: 10.1016/j.egypro.2011.11.005