Learn More
Protecting a software from unauthorized access is an ever demanding task. Thus, in this paper, we focus on the protection of source code by means of obfuscation and discuss the adaptation of a control flow transformation technique called control flow flattening to the C++ language. In addition to the problems of adaptation and the solutions proposed for(More)
Grain boundaries (GB) are characterized by disorientation of the neighboring grains and the direction of the boundary plane between them. A new approach presented here determines the projection of GB that can be used to determine the latter one. The novelty is that an additional parameter of GB is quantified in addition to the ones provided by the(More)
Correlation coefficient maps are constructed by computing the differences between neighboring diffraction patterns collected in a transmission electron microscope in scanning mode. The maps are shown to highlight material structural features like grain boundaries, second phase particles or dislocations. The inclination of the inner crystal interfaces are(More)
A new approach for measurement of local thickness and characterization of grain boundaries is presented. The method is embodied in a software tool that helps to find and set sample orientations useful for high-resolution transmission electron microscopic (HRTEM) examination of grain boundaries in polycrystalline thin films. The novelty is the simultaneous(More)
  • 1