Control flow graph

Results: 74



#Item
11Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty Amulya Yadav, Hau Chan1 , Albert Jiang1 , Haifeng Xu, Eric Rice, Milind Tambe University of Southern California, Los Angele

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty Amulya Yadav, Hau Chan1 , Albert Jiang1 , Haifeng Xu, Eric Rice, Milind Tambe University of Southern California, Los Angele

Add to Reading List

Source URL: teamcore.usc.edu

Language: English - Date: 2016-02-11 22:17:39
12Transformation-aware Exploit Generation using a HICFG  Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
13Interference Arises at the Receiver Martin Fussen, Roger Wattenhofer, Aaron Zollinger {mafussen@student, , }.ethz.ch Computer Engineering and Networks Laboratory ETH Zurich, Switzerland

Interference Arises at the Receiver Martin Fussen, Roger Wattenhofer, Aaron Zollinger {mafussen@student, , }.ethz.ch Computer Engineering and Networks Laboratory ETH Zurich, Switzerland

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:28
14Control Flow Obfuscation with Information Flow Tracking∗ Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang Parallel Processing Institute Fudan University

Control Flow Obfuscation with Information Flow Tracking∗ Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang Parallel Processing Institute Fudan University

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:24:59
15Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
16Transformation-aware Exploit Generation using a HICFG  Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
17A New Loop Optimizer for GCC Zdenˇek Dvoˇrák SuSE Labs , http://atrey.karlin.mff.cuni.cz/˜rakdver/  Abstract

A New Loop Optimizer for GCC Zdenˇek Dvoˇrák SuSE Labs , http://atrey.karlin.mff.cuni.cz/˜rakdver/ Abstract

Add to Reading List

Source URL: gcc.cybermirror.org

Language: English - Date: 2004-08-29 18:00:00
18Map-Matching for Low-Sampling-Rate GPS Trajectories Yin Lou Chengyang Zhang  Yu Zheng

Map-Matching for Low-Sampling-Rate GPS Trajectories Yin Lou Chengyang Zhang Yu Zheng

Add to Reading List

Source URL: www.cse.unt.edu

Language: English - Date: 2013-08-12 14:20:54
19The Machine-SUIF Control Flow Graph Library Release versionGlenn Holloway and Michael D. Smith {holloway,smith}@eecs.harvard.edu Division of Engineering and Applied Sciences Harvard University

The Machine-SUIF Control Flow Graph Library Release versionGlenn Holloway and Michael D. Smith {holloway,smith}@eecs.harvard.edu Division of Engineering and Applied Sciences Harvard University

Add to Reading List

Source URL: www.eecs.harvard.edu

- Date: 2002-07-15 23:52:03
    20A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

    A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2012-06-05 18:18:00