Search
Now showing items 21-30 of 96
Context-sensitive analysis without calling-context
(2010-09-01)
Since Sharir and Pnueli, algorithms for context-sensitivity have been defined in terms of 'valid' paths in an interprocedural flow graph. The definition of valid paths requires atomic call and ret statements, and encapsulated ...
Non-financial reporting by B corporations: a quest for transparency
(2022-06-27)
Esta tese de doutorado investiga sociedades comerciais certificadas como empresas B (B Lab, 2018; 2019), especialmente sua transparência, com ênfase em seus relatórios publicados e como estes contribuem para a accountability ...
Ofuscamento de código para proteção de programas Java contra engenharia reversa
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Informática, 2012-08-17)
This paper aims to present and define code obfuscation as means of protecting intellectual property present on Java programs, covering it's techniques and showing how each of them work. Furthermore, discussesit's advantages ...
Identificação e caracterização de campanhas de spam a partir de honeypots
(Universidade Federal de Minas GeraisUFMG, 2009-03-09)
This work presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network resources and obfuscate their messages, an ...
Automatic Generation of Summary Obfuscation Corpus for Plagiarism Detection
(Research Gate, 2017)
Otimização bytecode Java na plataforma J2ME
(Universidade Federal de Pernambuco, 2014)
Latin America and the middle-income trap
(ECLAC, 2014-06)
Promising economic growth during the 2000s obfuscates the reality that Latin American countries are
facing the acute threat of a middle-income trap. In a review of the literature on the middle-income trap I
distinguish ...