Sciweavers

3456 search results - page 57 / 692
» Byte Code Engineering
Sort
View
MSR
2005
ACM
15 years 7 months ago
Using a clone genealogy extractor for understanding and supporting evolution of code clones
Programmers often create similar code snippets or reuse existing code snippets by copying and pasting. Code clones —syntactically and semantically similar code snippets—can ca...
Miryung Kim, David Notkin
MSR
2009
ACM
15 years 8 months ago
Does calling structure information improve the accuracy of fault prediction?
Previous studies have shown that software code attributes, such as lines of source code, and history information, such as the number of code changes and the number of faults in pr...
Yonghee Shin, Robert M. Bell, Thomas J. Ostrand, E...
INFOCOM
2006
IEEE
15 years 8 months ago
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Bradley Stephenson, Biplab Sikdar
TREC
2004
15 years 3 months ago
Using Clustering and Blade Clusters in the Terabyte Task
Web search engines exploit conjunctive queries and special ranking criteria which differ from the disjunctive queries typically used for ad-hoc retrieval. We wanted to asses the e...
Giuseppe Attardi, Andrea Esuli, Chirag Patel
CCR
2002
105views more  CCR 2002»
15 years 1 months ago
Adaptive packet sampling for flow volume measurement
Traffic measurement and monitoring are an important component of network management and traffic engineering. With high-speed Internet backbone links, efficient and effective packe...
Baek-Young Choi, Jaesung Park, Zhi-Li Zhang