Sciweavers

150 search results - page 1 / 30
» Using method stereotype distribution as a signature descript...
Sort
View
ICSM
2009
IEEE
13 years 10 months ago
Using method stereotype distribution as a signature descriptor for software systems
Method stereotype distribution is used as a signature for software systems. The stereotype for each method is determined using a presented taxonomy. The counts of the different st...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
ISSTA
2009
ACM
13 years 10 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
ICIP
2002
IEEE
14 years 5 months ago
Fuzzy color signatures
With the large and increasing amount of visual information available in digital libraries and the Web, efficient and robust systems for image retrieval are urgently needed. In thi...
Andrés Dorado, Ebroul Izquierdo
DSOM
2003
Springer
13 years 8 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
PODC
2003
ACM
13 years 9 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...