Sciweavers

2947 search results - page 390 / 590
» Analyzing Program Analyses
Sort
View
IWPSE
2010
IEEE
15 years 14 days ago
Evolutional analysis of licenses in FOSS
FOSS (Free and Open Source System) is repeatedly modied and reused by other FOSS or proprietary software systems. They are released to others under specic licenses whose terms and...
Yuki Manabe, Yasuhiro Hayase, Katsuro Inoue
133
Voted
SPEECH
2010
154views more  SPEECH 2010»
14 years 9 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...
139
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 9 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
140
Voted
CORR
2011
Springer
115views Education» more  CORR 2011»
14 years 6 months ago
SAT-Based Termination Analysis Using Monotonicity Constraints over the Integers
ibe an algorithm for proving termination of programs abstracted to systems of monotonicity constraints in the integer domain. Monotonicity constraints are a non-trivial extension ...
Michael Codish, Igor Gonopolskiy, Amir M. Ben-Amra...
201
Voted
ESORICS
2011
Springer
14 years 2 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao