Keyphrases
Binary Translator
94%
Attribute Grammars
76%
Wireless Sensor Networks
43%
Static Binary Translation
41%
X86-64
36%
Syntax Tree
35%
Programmer
34%
Binary Translation
34%
Program Integration
32%
NP-complete Problem
32%
Security Protocols
32%
Hyperchaining
32%
Compiler
31%
Lexical Analyzer
28%
Embedded Systems
28%
Integration Algorithm
27%
Latent Semantic Analysis
25%
Context-free Languages
25%
Evaluation Order
24%
Instruction Sets
24%
Programming Languages
24%
Parser
23%
Thumb
23%
Multi-visits
23%
Indirect Branch
22%
Traceback
21%
Attribute Dependence
21%
Dependence Graph
21%
Decision Tree
21%
Distributed Denial of Service (DDoS)
21%
Least Energy
21%
Java
21%
Semantics Preserving Transformation
21%
Java Language
21%
User Authentication Scheme
21%
Grey Relational Analysis
21%
Nested Parallelism
21%
Floating-point
21%
Instruction Set Architecture
18%
Grammar
18%
Dynamic Binary Translation
18%
Execution Behavior
18%
Token
17%
Petri Nets
16%
Attacker
16%
Energy Problem
14%
Integrated Programs
14%
Translation System
14%
Java Program
14%
Garbage Collection
14%
Computer Science
Binary Translator
100%
Attribute Grammar
76%
Binary Translation
65%
Wireless Sensor Network
43%
Experimental Result
34%
Security protocols
32%
Denial-of-Service
32%
Embedded System
27%
context-free language
27%
Evaluation Order
24%
Programming Language
24%
Spanning Tree
21%
Integration Technique
21%
Nested Parallelism
21%
Attribute-Dependence Graph
21%
Parsing
21%
User Authentication
21%
authentication scheme
21%
Garbage Collection
21%
Point Instruction
21%
Decision Tree
21%
Wireless Network
21%
Graphics Processing Unit
20%
Floating Point
19%
Attackers
19%
Computer Architecture
17%
C Program
17%
Petri Net
17%
Syntactics
17%
State Architecture
17%
Instance Attribute
16%
Translation System
16%
Java Programming Language
16%
Soundness
16%
Thumb Instruction
15%
Dynamic Binary Translation
15%
Virtual Machine
14%
Distributed Denial of Service Attack
14%
Static Evaluator
14%
Performance Improvement
13%
Space Overhead
13%
Automaton
13%
Driven Approach
13%
Sensor Networks
12%
Variable Length
11%
forgery attack
11%
False Negative
10%
Guided Optimization
10%
Comparator
10%
Reference Counting
10%