Sciweavers

99 search results - page 10 / 20
» Detecting metamorphic malwares using code graphs
Sort
View
ACSD
1998
IEEE
121views Hardware» more  ACSD 1998»
15 years 2 months ago
Identifying State Coding Conflicts in Asynchronous System Specifications Using Petri Net Unfoldings
State coding conflict detection is a fundamental part of synthesis of asynchronous concurrent systems from their specifications as Signal Transition Graphs (STGs), which are a spe...
Alex Kondratyev, Jordi Cortadella, Michael Kishine...
SCAM
2002
IEEE
15 years 2 months ago
Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages
This paper concerns the use of static analysis for debugging purposes of declarative object-oriented equation-based modeling languages. We propose a framework where over- and unde...
Peter Bunus, Peter Fritzson
TWC
2010
14 years 4 months ago
A Novel Graph-Based Suboptimal Multiuser Detector for FDM-CPM Transmissions
We consider a frequency division multiplexed (FDM) system where each user employs a continuous phase modulation (CPM), serially concatenated with an outer code through an interleav...
Amina Piemontese, Giulio Colavolpe
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
15 years 10 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
ERLANG
2004
ACM
15 years 3 months ago
Flow graphs for testing sequential Erlang programs
Testing of software components during development is a heavily used approach to detect programming errors and to evaluate the quality of software. Systematic approaches to softwar...
Manfred Widera