Sciweavers

127 search results - page 18 / 26
» Contract-Based Approach to Analyze Software Components
Sort
View
109
Voted
CCS
2008
ACM
15 years 1 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
SBMF
2009
Springer
184views Formal Methods» more  SBMF 2009»
15 years 6 months ago
Concolic Testing of the Multi-sector Read Operation for Flash Memory File System
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully...
Moonzoo Kim, Yunho Kim
93
Voted
ICDAR
2007
IEEE
15 years 6 months ago
Toponym Recognition in Scanned Color Topographic Maps
Topographic paper maps are a common support for geographical information. In the field of document analysis of this kind of support, this paper proposes an automatic approach to ...
Joachim Pouderoux, Jean-Christophe Gonzato, A. Per...
INFSOF
2002
147views more  INFSOF 2002»
14 years 11 months ago
On the efficiency of domain-based COTS product selection method
Use of commercial-off-the-shelf (COTS) products is becoming a popular software development method. Current methods of selecting COTS products involve using the intuition of softwa...
Karl R. P. H. Leung, Hareton K. N. Leung
WCRE
2002
IEEE
15 years 4 months ago
Disassembly of Executable Code Revisited
Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs. The task of disassembly is complicated by...
Benjamin Schwarz, Saumya K. Debray, Gregory R. And...