## Abstract An understanding of state transitions is essential in realβtime software design. However, satisfactory research has not been performed on methodologies to list the necessary states. A method is needed to systematically identify necessary states in order to meet the given requirements. T
β¦ LIBER β¦
A software protection method based on instruction camouflage
β Scribed by Yuichiro Kanzaki; Akito Monden; Masahide Nakamura; Ken'Ichi Matsumoto
- Book ID
- 102821078
- Publisher
- John Wiley and Sons
- Year
- 2005
- Tongue
- English
- Weight
- 500 KB
- Volume
- 89
- Category
- Article
- ISSN
- 1042-0967
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
A new design method of software based on
β
Naoko Yokoi; Takeshi Kaneko; Yoshinori Iizuka
π
Article
π
1994
π
John Wiley and Sons
π
English
β 937 KB
Software life cycle management based on
β
Franz Lehner
π
Article
π
1991
π
Elsevier Science
β 655 KB
A Classification of Refactoring Methods
β
Karim O. Elish; Mohammad Alshayeb
π
Article
π
2011
π
Springer-Verlag
π
English
β 662 KB
A design method of Business Application
β
He Ke-qing; Yang Chun-wen; Ying Shi
π
Article
π
2001
π
Wuhan University
π
English
β 514 KB
A new strategy of counterattacking anti-
β
Tao Yang; WeiHua Zhang; Gianmarco Radice
π
Article
π
2010
π
Science in China Press (SCP)
π
English
β 627 KB
A method for applying loop unrolling and
β
Nobuhiro Kondo; Akira Koseki; Hideaki Komatsu; Yoshiaki Fukazawa
π
Article
π
1998
π
John Wiley and Sons
π
English
β 614 KB
A considerable part of program execution time is consumed by loops, so that loop optimization is highly effective especially for the innermost loops of a program. Software pipelining and loop unrolling are known methods for loop optimization. Software pipelining is advantageous in that the code beco