Showing 161 - 180 results of 920 for search '"Control flow"', query time: 1.09s Refine Results
  1. 161
  2. 162
  3. 163

    Empirical analysis of existence dependency properties in object-oriented software by Chang, Hak Hee.

    Published 2008
    “…Our statistical validation gives evidence to support the validity of the control flow graph patterns.…”
    Get full text
    Thesis
  4. 164

    Dynamic analysis of virtualization- and dispatching-obfuscated applications by M. G. Bakulin, S. S. Gaissaryan, Sh. F. Kurmangaleev, I. N. Ledovskikh, V. A. Padaryan, S. M. Shchevyeva

    Published 2018-10-01
    “…Another obfuscation method known as “dispatching” can be used to transform application control flow similarly to virtual machine insertion. …”
    Get full text
    Article
  5. 165

    Software protection through obfuscation by Balachandran, Vivek

    Published 2015
    “…Following the two control flow obfuscation techniques obscuring the control flow within functions, we developed an inter-functional control flow obfuscation technique. …”
    Get full text
    Thesis
  6. 166

    Effects of air curtain dust control parameters on dust pollution in fully mechanized mining faces by LI Changjie, XIN Chuangye, WANG Hao

    Published 2024-10-01
    “…When the ratio of radial airflow distribution to total air supply was not less than 0.8 and the ratio of total air supply to negative pressure dust control flow was less than 1.0, the air curtain transitioned to axial movement in the jet region, forming an axial dust control flow field with a thickness of not less than 1.4 m. ② As radial airflow distribution and negative pressure dust control flow increased, the airflow quantity and speed distribution on the suction side of the tunnel became more uniform, leading to reduced dust dispersion distance and lower dust mass concentration at the operator's position. …”
    Get full text
    Article
  7. 167

    On the Automatic Analysis of the Practical Resistance of Obfusting Transformations by Petr D. Borisov, Yu. V. Kosolapov

    Published 2019-09-01
    “…The control flow graph is considered as the basis for building other candidates for program similarity indicators. …”
    Get full text
    Article
  8. 168

    Combining and Relating Control Effects and their Semantics by James Laird

    Published 2013-09-01
    “…Combining local exceptions and first class continuations leads to programs with complex control flow, as well as the possibility of expressing powerful constructs such as resumable exceptions. …”
    Get full text
    Article
  9. 169

    Synthesis from Probabilistic Components by Sumit Nain, Yoad Lustig, Moshe Y Vardi

    Published 2014-06-01
    “…They proved that dataflow synthesis is undecidable, while control-flow synthesis is decidable. In this work, we consider the problem of control-flow synthesis from libraries of probabilistic components . …”
    Get full text
    Article
  10. 170
  11. 171

    Hands-on Microsoft SQL server 2008 integration services / by 192022 Nanda, Ashwani

    Published c201
    “…Introducing SQL server integration services -- Getting started with wizards -- Nuts and bolts of the SSIS workflow -- Integration services control flow containers -- Integration services control flow tasks -- Administering integration services -- Securing integration services packages -- Advanced features of integration services -- Data flow components -- Data flow transformations -- Programming integration services -- Data warehousing and SQL server 2008 enhancements -- Deploying integration services packages -- Migrating to integration services 2008 -- Troubleshooting and performance enhancements.…”
  12. 172

    A graphical method for automatic code generation from extended s-system petri net models by Ng, Kok Mun

    Published 2006
    “…This involves the development of a procedure for automatically mapping S-System Petri Net models constructed in the diagram editor to control flow graphs. The procedure uses a notion called graph nesting to help the design tool read and understand S-System model diagrams and transform them into control flow graphs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 173

    A graphical method for automatic code generation from extended s-system petri net models by Ng, Kok Mun

    Published 2006
    “…This involves the development of a procedure for automatically mapping S-System Petri Net models constructed in the diagram editor to control flow graphs. The procedure uses a notion called graph nesting to help the design tool read and understand S-System model diagrams and transform them into control flow graphs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 174

    Program Analysis by Digital Computer by Wilde, Daniel Underwood

    Published 2023
    “…First, the program control flow is detected; second, that control flow is used to determine the program data flow or data processing. …”
    Get full text
  15. 175
  16. 176

    Machine-specific optimization methods for C/C++ applications that are distributed in the LLVM intermediate representation format by Sh. F. Kurmangaleev

    Published 2018-10-01
    “…The paper presents a static instrumentation technique with incomplete control flow edge covering and its correction to the full control flow profile. …”
    Get full text
    Article
  17. 177

    Methods of profile information correction during compilation by O. A. Chetverina

    Published 2018-10-01
    “…After applying transformations, which change control flow graph, it is necessary to adjust the profile information in order to maintain its adequacy for the work of succeeding optimizations. …”
    Get full text
    Article
  18. 178

    Optimized Data-Flow Integrity for Modern Compilers by Irene Diez-Franco, Xabier Ugarte-Pedrero, Pablo Garcia-Bringas

    Published 2024-01-01
    “…Non-control-data attacks are those attacks that purely target and modify the non-control data of a program, such as boolean values, user input or configuration parameters, and leave the control flow of a program untouched. These attacks were considered a niche due to the high difficulty in crafting attacks that do not modify the control flow. …”
    Get full text
    Article
  19. 179
  20. 180

    Probabilistic data flow analysis: a linear equational approach by Alessandra Di Pierro, Herbert Wiklicky

    Published 2013-07-01
    “…Speculative optimisation relies on the estimation of the probabilities that certain properties of the control flow are fulfilled. Concrete or estimated branch probabilities can be used for searching and constructing advantageous speculative and bookkeeping transformations. …”
    Get full text
    Article