1.
|
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques Dolz, Daniel - Parra, Gerardo
|
2.
|
The JK System to Detect Plagiarism Sabri, Khair Eddin M. - Al-Jaafer, Jubair J.
|
3.
|
Computer networks. A top-down approach featuring Internet, second edition, Redes de Computadores – Un enfoque descendente basado en Internet. Segunda edición López, Ricardo A.
|
4.
|
Inheritance, Generics and Binary Methods in Java Barrón-Estrada,María Lucía - Stansifer,Ryan
|
5.
|
Region Type Checking for Core-Java Chin, Wei Ngan - Qin, Shengchao - Rinard, Martin C.
|
6.
|
VisualJVM: a visual tool for teaching Java technology Garrido Abenza, Pedro Pablo - Ledesma Latorre, Bernardo - Grediaga Olivo, Ángel
|
7.
|
Three light-weight execution engines in Java for web data-intensive data source contents : (extended abstract)
|
8.
|
Encryption Key Search using Java-based ALiCE Grid Virkar, Ameya
|
9.
|
MATLAB*G: A Grid-Based Parallel MATLAB Chen, Ying - Tan, Suan Fong
|
10.
|
Software fault identification via dynamic analysis and machine learning Brun, Yuriy, 1981-
|