Results 1 to 10 of about 22,136 (208)
Opaque Predicate Construction Algorithm Without Size Constraints [PDF]
Combined with opaque predicate,control flow obfuscation enables semantics-preserving transformations,which can achieve the purpose of code protection.However,existing opaque predicate is easily attacked by symbolic execution and has the problem of small ...
WANG Yufang, LE Deguang, Jack TAN, XIAO Le, GONG Shengrong
doaj +1 more source
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG +4 more
doaj +3 more sources
Due to its technological applications, such as CO2 capture, CaO carbonation kinetics has been extensively studied using a wide array of methods and experimental conditions.
Juan Arcenegui-Troya +5 more
doaj +1 more source
As a primary stage of connected and automated vehicles (CAVs), the cooperative adaptive cruise control (CACC) system takes some outstanding advantages such as accurate perception and timely reaction, which benefit from vehicular communication, over human-
Xuedong Hua, Weijie Yu, Wei Wang
doaj +1 more source
The IPAC Image Subtraction and Discovery Pipeline for the intermediate Palomar Transient Factory [PDF]
We describe the near real-time transient-source discovery engine for the intermediate Palomar Transient Factory (iPTF), currently in operations at the Infrared Processing and Analysis Center (IPAC), Caltech.
Barlow, Tom +19 more
core +2 more sources
Negative affective state mimics effects of perceptual load on spatial perception [PDF]
Recent electrophysiological evidence has shown that perceptual load and negative affective state can produce very similar, early-attention gating effects in early visual areas, modulating the processing of peripheral stimuli.
Pourtois, Gilles, Rossi, Valentina
core +1 more source
What lies beneath: exploring links between asylum policy and hate crime in the UK [PDF]
This paper explores the link between increasing incidents of hate crime and the asylum policy of successive British governments with its central emphasis on deterrence.
A Dummett +59 more
core +1 more source
Using isotopes to constrain water flux and age estimates in snow-influenced catchments using the STARR (Spatially distributed Tracer-Aided Rainfall-Runoff) model [PDF]
Acknowledgements. This work was funded by the NERC/JPI SIWA project (NE/M019896/1) and the European Research Council ERC (project GA 335910 VeWa). Numerical simulations were performed using the Maxwell High Performance Computing Cluster of the University
Ala-aho, Pertti +4 more
core +4 more sources
The nature of the continuum limit in the 2D $RP^2$ gauge model [PDF]
The RP(2) gauge model is studied in 2D. We use Monte-Carlo renormalization techniques for blocking the mean spin-spin interaction, , and the mean gauge field plaquette, . The presence of the O(3) renormalized trajectory is verified and is consistent with
A. Hasenfratz +22 more
core +4 more sources
Simplified Distributed Programming with Micro Objects
Developing large-scale distributed applications can be a daunting task. object-based environments have attempted to alleviate problems by providing distributed objects that look like local objects.
Gwen Salaün +3 more
core +3 more sources

