Sciweavers

TIT
2002
91views more  TIT 2002»
13 years 4 months ago
On limited-delay lossy coding and filtering of individual sequences
Abstract--We continue the study of adaptive schemes for the sequential lossy coding of individual sequences which was recently initiated by Linder and Lugosi. Specifically, we cons...
Tsachy Weissman, Neri Merhav
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
13 years 4 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
ASE
1998
81views more  ASE 1998»
13 years 4 months ago
Program Understanding as Constraint Satisfaction: Representation and Reasoning Techniques
The process of understanding a source code in a high-level programming language involves complex computation. Given a piece of legacy code and a library of program plan templates, ...
Steven G. Woods, Qiang Yang
CN
2000
88views more  CN 2000»
13 years 4 months ago
JavaML: a markup language for Java source code
The classical plain-text representation of source code is convenient for programmers but requires parsing to uncover the deep structure of the program. While sophisticated softwar...
Greg J. Badros
ASE
2002
141views more  ASE 2002»
13 years 4 months ago
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems
The cost of maintaining a software system over a long period of time far exceeds its initial development cost. Much of the maintenance cost is attributed to the time required by ne...
Martin Traverso, Spiros Mancoridis
TSE
2008
101views more  TSE 2008»
13 years 4 months ago
DeMIMA: A Multilayered Approach for Design Pattern Identification
Design patterns are important in object-oriented programming because they offer design motifs, elegant solutions to recurrent design problems, which improve the quality of software...
Yann-Gaël Guéhéneuc, Giuliano A...
TIT
2008
86views more  TIT 2008»
13 years 4 months ago
Optimal Prefix Codes for Infinite Alphabets With Nonlinear Costs
Let P = {p(i)} be a measure of strictly positive probabilities on the set of nonnegative integers. Although the countable number of inputs prevents usage of the Huffman algorithm, ...
Michael B. Baer
IJDE
2007
123views more  IJDE 2007»
13 years 4 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
ENTCS
2007
85views more  ENTCS 2007»
13 years 4 months ago
Stochastic Modelling of Communication Protocols from Source Code
A major development in qualitative model checking was the jump to verifying properties of source code directly, rather than requiring a separately specified model. We describe an...
Michael J. A. Smith
DKE
2007
115views more  DKE 2007»
13 years 4 months ago
An improved methodology on information distillation by mining program source code
This paper presents a methodology for knowledge acquisition from source code. We use data mining to support semiautomated software maintenance and comprehension and provide practi...
Yiannis Kanellopoulos, Christos Makris, Christos T...