Filters








235 Hits in 6.0 sec

Obfuscating Java: The Most Pain for the Least Gain [chapter]

Michael Batchelder, Laurie Hendren
Lecture Notes in Computer Science  
These results show that most of the obfuscations have only minor negative performance impacts and many increase complexity.  ...  Those obfuscations that are decompilable greatly reduce the readability of output source. This work was supported, in part, by NSERC and FQRNT.  ...  However, a very important factor is that one wants the obfuscations to make reverse engineering difficult (the most pain), but at the same time not hurt performance of the obfuscated application (the least  ... 
doi:10.1007/978-3-540-71229-9_7 dblp:conf/cc/BatchelderH07 fatcat:z53fuvjfpzdqljjt6ioyzmre24

Java Cryptography

Jonathan Knudsen
1999 EDPACS: The EDP Audit, Control, and Security Newsletter  
It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider.  ...  First Edition May 1998 ISBN: 1-56592-402-9, 362 pages Java Cryptography teaches you how to write secure programs using Java's cryptographic tools.  ...  This process is easier in Java than in other languages. (See the discussion, later in this chapter, on disassemblers and code obfuscators.)  ... 
doi:10.1201/1079/43250.27.4.19991001/30275.5 fatcat:exerh23znrh4rbwwwfwk3nivry

The Tale of Java Performance

Osvaldo Pinali Doederlein
2003 Journal of Object Technology  
Late in the JDK1.1 cycle, the Sun EVM and the IBM JDK introduced stronger JITs and also the first decent GCs for Java.  ...  BRIEF HISTORY OF JAVA IMPLEMENTATIONS Java, like most new languages, suffered from immature implementations and very weak performance in the early days.  ...  JVMs, as well as the CLR, need at least two-word headers), which reduces the need for impureness in the object model.  ... 
doi:10.5381/jot.2003.2.5.c3 fatcat:nwgd4zsa2feinepz622opcfq4e

The Julia Static Analyzer for Java [chapter]

Fausto Spoto
2016 Lecture Notes in Computer Science  
The Julia static analyzer applies abstract interpretation to the analysis and verification of Java bytecode.  ...  Julia is a library for static analysis, over which many checkers have been built, that verify the absence of a large set of typical errors of software: among them are null-pointer accesses, non-termination  ...  analyses in parallel with a performance gain, as long as they do not interact.  ... 
doi:10.1007/978-3-662-53413-7_3 fatcat:yc52a75pejcwhcsd3lobrha7l4

Disrupting surveillance: critical software design-led practice to obfuscate and reveal surveillance economies and knowledge monopolies [article]

Hadi Mehrpouya, University Of Edinburgh, Chris Speed, Craig Martin
2021
I analyse the contextual background of this body of work and its take on technology as a central lever for governance and for shaping of human subjects.  ...  This thesis investigates the taken for granted ways our interactions with surveillance capitalism infrastructures are transforming our individual and collective beings and in turn the new cyborg ontologies  ...  most "relevant" results for each search.  ... 
doi:10.7488/era/1188 fatcat:dqzfuxychfafdabx4yhz3c5ioe

Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations [article]

Weiwei Zhang, Shengjian Guo, Hongyu Zhang, Yulei Sui, Yinxing Xue, Yun Xu
2021 arXiv   pre-print
CloneGen Meanwhile, compared with the commonly-used heuristics, the DRLSG strategy has shown the best effectiveness in generating code clones to decrease the detection accuracy of the ML-based detectors  ...  CloneGen In evaluation, we challenge the two state-of-the-art ML-based detectors and four traditional detectors with the code clones after semantic-preserving transformations via the aid of CloneGen.  ...  On the other side, the RS strategy (i.e., D RS ) seems to be the least effective among the four strategies, generating the most detectable clone pairs and resulting in high detection accuracy.  ... 
arXiv:2111.10793v1 fatcat:52l3zpxgdnbaffcxeqitlehmpq

From novel mathematics to efficient algorithms. Do we have proper SD foundation to build future? [article]

F.V.Tkachov
2002 arXiv   pre-print
by the software industry (Sun's Java and Microsoft's C#).  ...  In a stark contrast with the deeply flawed C++, the Oberon technologies (specifically, the Component Pascal and the BlackBox development environment) offer an unparalleled SD platform for building scientific  ...  I thank D.Perret-Gallix and the Japanese hosts for their hospitality during the workshop; the Oberon microsystems crew and Niklaus Wirth for several discussions; M.Veltman for a discussion of scientific  ... 
arXiv:hep-ph/0202033v2 fatcat:l5esmlkjovcpdnoepq5lza776e

New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges [article]

Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu
2020 arXiv   pre-print
We again show how the open research challenges benefit from reliability, security, and privacy advancements in other areas. We conclude by providing a vision for a desirable end state for IoT systems.  ...  We then discuss the unique challenges for reliability, security, and privacy posed by IoT systems due to their salient characteristics which include heterogeneity of devices and protocols, dependence on  ...  These will enhance the quality of decisions for most applications discussed above.  ... 
arXiv:2005.07338v1 fatcat:a6hb5dpk7fgwreua5x2n7vlw7y

The Goat that Couldn't Stop the Mud Volcano

Phillip Drake
2012 Humanimalia - a journal of human/animal interface studies  
being and relating within ecological networks, so that we can become better, or at least more self-aware, actors in our ecological communities.  ...  As this project traces the various ways sacrificial violence expresses subjectivity, it will consider the staging of unequal power relations in both the execution and the representation of the sacrifice  ...  Still, just as commodity production is not inherently malignant for labor, the aesthetic is not merely a structure of estrangement and obfuscation.  ... 
doi:10.52537/humanimalia.10033 fatcat:qoxgy2kohnbfro3vagzkm4bfba

A comparative evaluation of systems for scalable linear algebra-based analytics

Anthony Thomas, Arun Kumar
2018 Proceedings of the VLDB Endowment  
But implementing new scalable algorithms in low-level languages is a painful process, especially for users in enterprise and domain scientific settings.  ...  All of our code and data scripts are available for download at https://adalabucsd.github.io/slab.html.  ...  Ordinary Least Squares (OLS). OLS is the most popular algorithm for linear regression [9, 49] .  ... 
doi:10.14778/3275366.3275367 fatcat:35labcdoqfa73kcovd6ds6ms3u

Alternate modes of prosperity

Konstantinos Retsikas, Magnus Marsden
2018 HAU: Journal of Ethnographic Theory  
As Marsden has recently argued, treating neo-liberalism as the singularly most relevant frame for the analysis of economic life obfuscates 'the interplay of local sociality, official discourse and state  ...  It is precisely because Smith conceives of exchange as a 'natural' by-product of the 'necessary' division of labour (2007: 13) that he is at pains to outline the most appropriate method for conducting  ... 
doi:10.1086/701215 fatcat:wajxn6az7neh5hdhosqr5oznfm

Front Matter

1992 Economic development and cultural change  
Most firms have at least one worker, in addition to the entrepreneur, for at least part of the year. 2. The firms are more highly capitalized.  ...  These are the densely populated, resource-poor (at least in terms of land-labor ratios) regions of Bali and East Java.  ... 
doi:10.1086/edcc.40.2.1154195 fatcat:wvuwdfdmojbixdcdtxx67aekjq

Channels of Ventriloquism In New Media Artworks

Victoria Bradbury
2014 Journal of Science and Technology of the Arts  
Two of the author's artworks, Toast and Ventriloquisms for Fun and Profit, are used as case studies.  ...  Throughout the text, ventriloquism diagrams are used to illustrate possibilities for directional transmission of speech and to reflect upon the roles of code, artist, and participant in new media artworks  ...  When I changed the value of makeDummy from false to true, the dummy appeared to have suddenly gained the ability to move his mouth.  ... 
doi:10.7559/citarj.v6i1.124 fatcat:h3ay2267a5ectmaezhxnu4ueka

A Comprehensive Study on Challenges in Deploying Deep Learning Based Software [article]

Zhenpeng Chen and Yanbin Cao and Yuanqiang Liu and Haoyu Wang and Tao Xie and Xuanzhe Liu
2020 arXiv   pre-print
for researchers, developers, and DL framework vendors.  ...  We mine and analyze 3,023 relevant posts from Stack Overflow, a popular Q&A website for developers, and show the increasing popularity and high difficulty of DL software deployment among developers.  ...  a new language (e.g., Java or C/C++).  ... 
arXiv:2005.00760v4 fatcat:auxizifdrbd6ppahv6ji4cvxs4

Can There Be Southeast Asians in Southeast Asian Studies?

Ariel Heryanto
2002 Moussons  
It is not difficult to imagine how painful all this can be for the children of the high modernity in the West.  ...  Different Nationals, Different Interests The condition of the social sciences and humanities in most countries in Southeast Asia has been rather disheartening, to say the least (see Booth 1999 , Schulte  ...  First, some sort of area studies can be predicted to grow in scale and importance in most parts of Southeast Asia, although the name and boundary of this area of analysis may be different from that of  ... 
doi:10.4000/moussons.2658 fatcat:ytcx5kugivb77nxijjkzittb2q
« Previous Showing results 1 — 15 out of 235 results