Obfuscation

Results: 1117



#Item
571Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Software engineering / Computing

BOOK energy-band factors. There follows a critical treatment of the various concepts of atomic size, which includes detailed comparison of theory and experiment.

Add to Reading List

Source URL: journals.iucr.org

Language: English - Date: 2008-12-23 15:41:30
572Data types / Type theory / Software bugs / Primitive types / Procedural programming languages / Pointer / Type safety / Stack / Variable / Software engineering / Computing / Computer programming

Independence From Obfuscation: A Semantic Framework for Diversity Fred B. Schneider Cornell University Ithaca, NY[removed]USA [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:10:19
573Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Computing / Software engineering

RESOLUTION NO[removed]A RESOLUTION OF THE CITY COUNCIL OF THE CITY OF ANAHEIM REVISING FEES FOR SERVICES RENDERED BY THE ANAHEIM FIRE DEPARTMENT ESTABLISHING THE EFFECTIVE

Add to Reading List

Source URL: www.anaheim.net

Language: English - Date: 2013-03-20 14:18:34
574Software engineering / Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Latin alphabets / Computing

luna’s living kitchen b re a kfa st s e r ve d 8 a m to 11a m breakfast juices

Add to Reading List

Source URL: www.lunaslivingkitchen.com

Language: English - Date: 2014-09-28 22:23:35
575Internet / Computing / Location obfuscation / World Wide Web / Cloaking / Anonymizer / Location-based service / P3P / Anonymity / Geolocation / Internet privacy / Navigation

Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid Bhuvan Bamba, Ling Liu, Peter Pesti, Ting Wang College of Computing Georgia Institute of Technology Atlanta, GA 30332, USA

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2008-03-03 09:30:02
576Data synchronization / Computer storage / Replication / Obfuscated code / Obfuscation / Fault-tolerant system / Tamper resistance / Proactivity / Computer security / Computing / Fault-tolerant computer systems / Computer programming

4 Proactive Obfuscation TOM ROEDER Microsoft Research and

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2010-08-11 18:49:50
577Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Linguistics / Computing

“Every one said to his brother, VOLUME XII COLLEGE Wyoming Conference

Add to Reading List

Source URL: docs.adventistarchives.org

Language: English - Date: 2013-11-13 21:07:50
578Software engineering / Obfuscated code / Obfuscation / Source code / International Obfuscated C Code Contest / Computer programming / Latin alphabets / Computing

Java Programming/Print version Wikibooks.org February 15, 2012

Add to Reading List

Source URL: upload.wikimedia.org

Language: English - Date: 2013-10-07 05:04:45
579Obfuscated code / Obfuscation / Source code

[removed]   Global Geospatial Conference 2012 May 14-17, 2012 C o n t e n t

Add to Reading List

Source URL: www.gsdi.org

Language: English - Date: 2012-06-23 12:36:02
580Obfuscated code / Obfuscation / Source code / International Obfuscated C Code Contest / Computer programming / Computing / Software engineering

November[removed]Monthly news and analysis for Luxembourg Fund of confidence

Add to Reading List

Source URL: www.vo.lu

Language: English - Date: 2011-03-10 04:32:31
UPDATE