Sciweavers

31 search results - page 6 / 7
» Detection and analysis of near-miss software clones
Sort
View
DOCENG
2007
ACM
13 years 9 months ago
XML version detection
The problem of version detection is critical in many important application scenarios, including software clone identification, Web page ranking, plagiarism detection, and peer-to-...
Deise de Brum Saccol, Nina Edelweiss, Renata de Ma...
SAC
2009
ACM
14 years 2 days ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
BMCBI
2004
174views more  BMCBI 2004»
13 years 5 months ago
SeeGH - A software tool for visualization of whole genome array comparative genomic hybridization data
Background: Array comparative genomic hybridization (CGH) is a technique which detects copy number differences in DNA segments. Complete sequencing of the human genome and the dev...
Bryan Chi, Ronald J. deLeeuw, Bradley P. Coe, Calu...
ERSHOV
2009
Springer
13 years 9 months ago
Anti-unification Algorithms and Their Applications in Program Analysis
A term t is called a template of terms t1 and t2 iff t1 = t1 and t2 = t2, for some substitutions 1 and 2. A template t of t1 and t2 is called the most specific iff for any template...
Peter E. Bulychev, Egor V. Kostylev, Vladimir A. Z...
JIB
2007
95views more  JIB 2007»
13 years 5 months ago
Mining for Single Nucleotide Polymorphisms in Expressed Sequence Tags
As a multitude of sequence data are published, discovering polymorphisms bioinformatically becomes a valid option. In silico Single Nucleotide Polymorphism (SNP) detection is base...
E. L. Souche, B. Hellemans, J. K. J. Van Houdt, A....