-
161
-
162
Fault-tolerant method for anti-SEU of embedded system based on dual-core processor
Published 2019-10-01Subjects: Get full text
Article -
163
Empirical analysis of existence dependency properties in object-oriented software
Published 2008“…Our statistical validation gives evidence to support the validity of the control flow graph patterns.…”
Get full text
Thesis -
164
Dynamic analysis of virtualization- and dispatching-obfuscated applications
Published 2018-10-01“…Another obfuscation method known as “dispatching” can be used to transform application control flow similarly to virtual machine insertion. …”
Get full text
Article -
165
Software protection through obfuscation
Published 2015“…Following the two control flow obfuscation techniques obscuring the control flow within functions, we developed an inter-functional control flow obfuscation technique. …”
Get full text
Thesis -
166
Effects of air curtain dust control parameters on dust pollution in fully mechanized mining faces
Published 2024-10-01“…When the ratio of radial airflow distribution to total air supply was not less than 0.8 and the ratio of total air supply to negative pressure dust control flow was less than 1.0, the air curtain transitioned to axial movement in the jet region, forming an axial dust control flow field with a thickness of not less than 1.4 m. ② As radial airflow distribution and negative pressure dust control flow increased, the airflow quantity and speed distribution on the suction side of the tunnel became more uniform, leading to reduced dust dispersion distance and lower dust mass concentration at the operator's position. …”
Get full text
Article -
167
On the Automatic Analysis of the Practical Resistance of Obfusting Transformations
Published 2019-09-01“…The control flow graph is considered as the basis for building other candidates for program similarity indicators. …”
Get full text
Article -
168
Combining and Relating Control Effects and their Semantics
Published 2013-09-01“…Combining local exceptions and first class continuations leads to programs with complex control flow, as well as the possibility of expressing powerful constructs such as resumable exceptions. …”
Get full text
Article -
169
Synthesis from Probabilistic Components
Published 2014-06-01“…They proved that dataflow synthesis is undecidable, while control-flow synthesis is decidable. In this work, we consider the problem of control-flow synthesis from libraries of probabilistic components . …”
Get full text
Article -
170
Analysis of defenses against code reuse attacks on modern and new architectures
Published 2016Get full text
Thesis -
171
Hands-on Microsoft SQL server 2008 integration services /
Published c201“…Introducing SQL server integration services -- Getting started with wizards -- Nuts and bolts of the SSIS workflow -- Integration services control flow containers -- Integration services control flow tasks -- Administering integration services -- Securing integration services packages -- Advanced features of integration services -- Data flow components -- Data flow transformations -- Programming integration services -- Data warehousing and SQL server 2008 enhancements -- Deploying integration services packages -- Migrating to integration services 2008 -- Troubleshooting and performance enhancements.…”
-
172
A graphical method for automatic code generation from extended s-system petri net models
Published 2006“…This involves the development of a procedure for automatically mapping S-System Petri Net models constructed in the diagram editor to control flow graphs. The procedure uses a notion called graph nesting to help the design tool read and understand S-System model diagrams and transform them into control flow graphs. …”
Get full text
Get full text
Get full text
Thesis -
173
A graphical method for automatic code generation from extended s-system petri net models
Published 2006“…This involves the development of a procedure for automatically mapping S-System Petri Net models constructed in the diagram editor to control flow graphs. The procedure uses a notion called graph nesting to help the design tool read and understand S-System model diagrams and transform them into control flow graphs. …”
Get full text
Get full text
Get full text
Thesis -
174
Program Analysis by Digital Computer
Published 2023“…First, the program control flow is detected; second, that control flow is used to determine the program data flow or data processing. …”
Get full text
-
175
-
176
Machine-specific optimization methods for C/C++ applications that are distributed in the LLVM intermediate representation format
Published 2018-10-01“…The paper presents a static instrumentation technique with incomplete control flow edge covering and its correction to the full control flow profile. …”
Get full text
Article -
177
Methods of profile information correction during compilation
Published 2018-10-01“…After applying transformations, which change control flow graph, it is necessary to adjust the profile information in order to maintain its adequacy for the work of succeeding optimizations. …”
Get full text
Article -
178
Optimized Data-Flow Integrity for Modern Compilers
Published 2024-01-01“…Non-control-data attacks are those attacks that purely target and modify the non-control data of a program, such as boolean values, user input or configuration parameters, and leave the control flow of a program untouched. These attacks were considered a niche due to the high difficulty in crafting attacks that do not modify the control flow. …”
Get full text
Article -
179
-
180
Probabilistic data flow analysis: a linear equational approach
Published 2013-07-01“…Speculative optimisation relies on the estimation of the probabilities that certain properties of the control flow are fulfilled. Concrete or estimated branch probabilities can be used for searching and constructing advantageous speculative and bookkeeping transformations. …”
Get full text
Article