A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Obfuscating Java: The Most Pain for the Least Gain
[chapter]
Lecture Notes in Computer Science
These results show that most of the obfuscations have only minor negative performance impacts and many increase complexity. ...
Those obfuscations that are decompilable greatly reduce the readability of output source. This work was supported, in part, by NSERC and FQRNT. ...
However, a very important factor is that one wants the obfuscations to make reverse engineering difficult (the most pain), but at the same time not hurt performance of the obfuscated application (the least ...
doi:10.1007/978-3-540-71229-9_7
dblp:conf/cc/BatchelderH07
fatcat:z53fuvjfpzdqljjt6ioyzmre24
Java Cryptography
1999
EDPACS: The EDP Audit, Control, and Security Newsletter
It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider. ...
First Edition May 1998 ISBN: 1-56592-402-9, 362 pages Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. ...
This process is easier in Java than in other languages. (See the discussion, later in this chapter, on disassemblers and code obfuscators.) ...
doi:10.1201/1079/43250.27.4.19991001/30275.5
fatcat:exerh23znrh4rbwwwfwk3nivry
The Tale of Java Performance
2003
Journal of Object Technology
Late in the JDK1.1 cycle, the Sun EVM and the IBM JDK introduced stronger JITs and also the first decent GCs for Java. ...
BRIEF HISTORY OF JAVA IMPLEMENTATIONS Java, like most new languages, suffered from immature implementations and very weak performance in the early days. ...
JVMs, as well as the CLR, need at least two-word headers), which reduces the need for impureness in the object model. ...
doi:10.5381/jot.2003.2.5.c3
fatcat:nwgd4zsa2feinepz622opcfq4e
The Julia Static Analyzer for Java
[chapter]
2016
Lecture Notes in Computer Science
The Julia static analyzer applies abstract interpretation to the analysis and verification of Java bytecode. ...
Julia is a library for static analysis, over which many checkers have been built, that verify the absence of a large set of typical errors of software: among them are null-pointer accesses, non-termination ...
analyses in parallel with a performance gain, as long as they do not interact. ...
doi:10.1007/978-3-662-53413-7_3
fatcat:yc52a75pejcwhcsd3lobrha7l4
Disrupting surveillance: critical software design-led practice to obfuscate and reveal surveillance economies and knowledge monopolies
[article]
2021
I analyse the contextual background of this body of work and its take on technology as a central lever for governance and for shaping of human subjects. ...
This thesis investigates the taken for granted ways our interactions with surveillance capitalism infrastructures are transforming our individual and collective beings and in turn the new cyborg ontologies ...
most "relevant" results for each search. ...
doi:10.7488/era/1188
fatcat:dqzfuxychfafdabx4yhz3c5ioe
Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations
[article]
2021
arXiv
pre-print
CloneGen Meanwhile, compared with the commonly-used heuristics, the DRLSG strategy has shown the best effectiveness in generating code clones to decrease the detection accuracy of the ML-based detectors ...
CloneGen In evaluation, we challenge the two state-of-the-art ML-based detectors and four traditional detectors with the code clones after semantic-preserving transformations via the aid of CloneGen. ...
On the other side, the RS strategy (i.e., D RS ) seems to be the least effective among the four strategies, generating the most detectable clone pairs and resulting in high detection accuracy. ...
arXiv:2111.10793v1
fatcat:52l3zpxgdnbaffcxeqitlehmpq
From novel mathematics to efficient algorithms. Do we have proper SD foundation to build future?
[article]
2002
arXiv
pre-print
by the software industry (Sun's Java and Microsoft's C#). ...
In a stark contrast with the deeply flawed C++, the Oberon technologies (specifically, the Component Pascal and the BlackBox development environment) offer an unparalleled SD platform for building scientific ...
I thank D.Perret-Gallix and the Japanese hosts for their hospitality during the workshop; the Oberon microsystems crew and Niklaus Wirth for several discussions; M.Veltman for a discussion of scientific ...
arXiv:hep-ph/0202033v2
fatcat:l5esmlkjovcpdnoepq5lza776e
New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges
[article]
2020
arXiv
pre-print
We again show how the open research challenges benefit from reliability, security, and privacy advancements in other areas. We conclude by providing a vision for a desirable end state for IoT systems. ...
We then discuss the unique challenges for reliability, security, and privacy posed by IoT systems due to their salient characteristics which include heterogeneity of devices and protocols, dependence on ...
These will enhance the quality of decisions for most applications discussed above. ...
arXiv:2005.07338v1
fatcat:a6hb5dpk7fgwreua5x2n7vlw7y
The Goat that Couldn't Stop the Mud Volcano
2012
Humanimalia - a journal of human/animal interface studies
being and relating within ecological networks, so that we can become better, or at least more self-aware, actors in our ecological communities. ...
As this project traces the various ways sacrificial violence expresses subjectivity, it will consider the staging of unequal power relations in both the execution and the representation of the sacrifice ...
Still, just as commodity production is not inherently malignant for labor, the aesthetic is not merely a structure of estrangement and obfuscation. ...
doi:10.52537/humanimalia.10033
fatcat:qoxgy2kohnbfro3vagzkm4bfba
A comparative evaluation of systems for scalable linear algebra-based analytics
2018
Proceedings of the VLDB Endowment
But implementing new scalable algorithms in low-level languages is a painful process, especially for users in enterprise and domain scientific settings. ...
All of our code and data scripts are available for download at https://adalabucsd.github.io/slab.html. ...
Ordinary Least Squares (OLS). OLS is the most popular algorithm for linear regression [9, 49] . ...
doi:10.14778/3275366.3275367
fatcat:35labcdoqfa73kcovd6ds6ms3u
Alternate modes of prosperity
2018
HAU: Journal of Ethnographic Theory
As Marsden has recently argued, treating neo-liberalism as the singularly most relevant frame for the analysis of economic life obfuscates 'the interplay of local sociality, official discourse and state ...
It is precisely because Smith conceives of exchange as a 'natural' by-product of the 'necessary' division of labour (2007: 13) that he is at pains to outline the most appropriate method for conducting ...
doi:10.1086/701215
fatcat:wajxn6az7neh5hdhosqr5oznfm
Front Matter
1992
Economic development and cultural change
Most firms have at least one worker, in addition to the entrepreneur, for at least part of the year.
2. The firms are more highly capitalized. ...
These are the densely populated, resource-poor (at least in terms of land-labor ratios) regions of Bali and East Java. ...
doi:10.1086/edcc.40.2.1154195
fatcat:wvuwdfdmojbixdcdtxx67aekjq
Channels of Ventriloquism In New Media Artworks
2014
Journal of Science and Technology of the Arts
Two of the author's artworks, Toast and Ventriloquisms for Fun and Profit, are used as case studies. ...
Throughout the text, ventriloquism diagrams are used to illustrate possibilities for directional transmission of speech and to reflect upon the roles of code, artist, and participant in new media artworks ...
When I changed the value of makeDummy from false to true, the dummy appeared to have suddenly gained the ability to move his mouth. ...
doi:10.7559/citarj.v6i1.124
fatcat:h3ay2267a5ectmaezhxnu4ueka
A Comprehensive Study on Challenges in Deploying Deep Learning Based Software
[article]
2020
arXiv
pre-print
for researchers, developers, and DL framework vendors. ...
We mine and analyze 3,023 relevant posts from Stack Overflow, a popular Q&A website for developers, and show the increasing popularity and high difficulty of DL software deployment among developers. ...
a new language (e.g., Java or C/C++). ...
arXiv:2005.00760v4
fatcat:auxizifdrbd6ppahv6ji4cvxs4
Can There Be Southeast Asians in Southeast Asian Studies?
2002
Moussons
It is not difficult to imagine how painful all this can be for the children of the high modernity in the West. ...
Different Nationals, Different Interests The condition of the social sciences and humanities in most countries in Southeast Asia has been rather disheartening, to say the least (see Booth 1999 , Schulte ...
First, some sort of area studies can be predicted to grow in scale and importance in most parts of Southeast Asia, although the name and boundary of this area of analysis may be different from that of ...
doi:10.4000/moussons.2658
fatcat:ytcx5kugivb77nxijjkzittb2q
« Previous
Showing results 1 — 15 out of 235 results