Sciweavers

220 search results - page 13 / 44
» A Language Independent Approach for Detecting Duplicated Cod...
Sort
View
ICDAR
2003
IEEE
15 years 5 months ago
Improved Nearest Neighbor Based Approach to Accurate Document Skew Estimation
The nearest-neighbor based document skew detection methods do not require the presence of a predominant text area, and are not subject to skew angle limitation. However, the accur...
Yue Lu, Chew Lim Tan
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 4 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
ECOOP
2007
Springer
15 years 4 months ago
A visual interface for type-related refactorings
In this paper, we present our approach to a visual refactoring tool, the Type Access Analyzer (TAA), which uses program analysis to detect code smells and for suggesting and perfo...
Philip Mayer, Andreas Meissner, Friedrich Steimann
CCS
2007
ACM
15 years 4 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
DATE
1999
IEEE
71views Hardware» more  DATE 1999»
15 years 4 months ago
Self Recovering Controller and Datapath Codesign
As society has become more reliant on electronics, the need for fault tolerant ICs has increased. This has resulted in signi cant research into both fault tolerant controller desi...
Samuel Norman Hamilton, Alex Orailoglu, Andre Hert...