Sciweavers

4307 search results - page 454 / 862
» Dynamic Spyware Analysis
Sort
View
PARMA
2004
162views Database» more  PARMA 2004»
15 years 6 months ago
UML-based Conceptual Modeling of Pattern-Bases
The concept of pattern, meant as an interesting knowledge artifact extracted from data, is considered to be a an effective answer to the advanced analysis requirements emerging in ...
Stefano Rizzi
ENTCS
2008
110views more  ENTCS 2008»
15 years 5 months ago
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic
HVEI
2010
15 years 6 months ago
Gloss discrimination and eye movements
Human observers are able to make fine discriminations of surface gloss. What cues are they using to perform this task? In previous studies, we identified two reflection-related cu...
Jonathan B. Phillips, James A. Ferwerda, Ann Nunzi...
136
Voted
ISSRE
2003
IEEE
15 years 10 months ago
Investigating Java Type Analyses for the Receiver-Classes Testing Criterion
This paper investigates the precision of three linearcomplexity type analyses for Java software: Class Hierarchy Analysis (CHA), Rapid Type Analysis (RTA) and Variable Type Analys...
Pierre-Luc Brunelle, Ettore Merlo, Giuliano Antoni...
JSS
2006
85views more  JSS 2006»
15 years 4 months ago
Effects of context on program slicing
Whether context-sensitive program analysis is more effective than context-insensitive analysis is an ongoing discussion. There is evidence that context-sensitivity matters in comp...
Jens Krinke