Learn More
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks. In this paper we review several techniques for technical protection(More)
It has become common to distribute software in forms that are isomorphic to the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks.In this paper we describe the design of a Java code obfuscator, a tool which - through the application of code(More)
To ensure platform independence, mobile programs are distributed in forms that are isomorphic to the original source code. Such codes are easy to decompile, and hence they increase the risk of malicious reverse engineering attacks. Code obfuscation is one of several techniques which has been proposed to alleviate this situation. An obfuscator is a tool(More)
We investigate the implementation of IP look-up for core routers using multiple microengines and a tailored memory hierarchy. The main architectural concerns are limiting thenumber of and contention for memory accesses.Using a level compressed trie as an index, we show the impact of the main parameter, the root branching factor, on the memory capacity and(More)
The language Java was designed to be compiled into a platform independent bytecode format. Much of the information contained in the source code remains in the bytecode, which means that decompilation is easier than with traditional native codes. As a result, software developers are taking seriously the threat of competitors using reverse-engineering to(More)
This study sought to determine whether using the Resuscitation Council UK's iResus© application on a smart phone improves the performance of doctors trained in advanced life support in a simulated emergency. Thirty-one doctors (advanced life support-trained within the previous 48 months) were recruited. All received identical training using the smart phone(More)
Traditional teaching of laryngoscopy is difficult due to the trainer and trainee lacking a shared view. The Karl Storz BERCI DCI Video Laryngoscope provides a video image for the trainer and a direct view identical to that of a standard laryngoscope for the trainee. Forty-nine novice subjects were randomly assigned to a control group (n = 24) taught using a(More)
  • D Low, Power Dissipation
  • 2008
DESCRIPTION The PCM3008 is a low cost single chip 16-bit stereo audio codec with single-ended analog voltage input and output. Both ADCs and DACs employ delta-sigma modulation with 64-times oversampling. ADCs include a digital decimation filter and digital high pass filter. DACs include an 8-times oversampling digital interpolation filter, digital(More)