Sciweavers

44 search results - page 8 / 9
» Mining source code to automatically split identifiers for so...
Sort
View
ACMSE
2006
ACM
13 years 11 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ICSM
2006
IEEE
13 years 11 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
CCS
2007
ACM
13 years 12 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
BMCBI
2008
144views more  BMCBI 2008»
13 years 5 months ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath
APSEC
2002
IEEE
13 years 10 months ago
An Automated Refactoring Approach to Design Pattern-Based Program Transformations in Java Programs
Software often needs to be modified for accommodating requirements changes through the software life cycle. To deal with several accidental requirements changes related to softwa...
Sang-Uk Jeon, Joon-Sang Lee, Doo-Hwan Bae