Sciweavers

30 search results - page 4 / 6
» Succinct Representation of Codes with Applications to Testin...
Sort
View
COMPSAC
2006
IEEE
13 years 11 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
OOPSLA
2009
Springer
14 years 9 days ago
Enhancing source-level programming tools with an awareness of transparent program transformations
Programs written in managed languages are compiled to a platform-independent intermediate representation, such as Java bytecode. The relative high level of Java bytecode has engen...
Myoungkyu Song, Eli Tilevich
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 4 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
SMI
2006
IEEE
186views Image Analysis» more  SMI 2006»
13 years 11 months ago
BSP Shapes
We discuss a shape representation based on a set of disconnected (planar) polygons. The polygons are computed by creating a BSP that contains approximately linear surface patches ...
Carsten Stoll, Hans-Peter Seidel, Marc Alexa
ICIAP
2001
Springer
14 years 5 months ago
2D Shape Recognition by Hidden Markov Models
In Computer Vision, two-dimensional shape classifcation is a complex and well studied topic, often basic for three-dimensional object recognition. Object contours are a widely cho...
Manuele Bicego, Vittorio Murino