Sciweavers

365 search results - page 29 / 73
» Extracting Business Rules from Source Code
Sort
View
WETICE
1999
IEEE
15 years 4 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
GFKL
2004
Springer
97views Data Mining» more  GFKL 2004»
15 years 5 months ago
Experimental Design for Variable Selection in Data Bases
This paper analyses the influence of 13 stylized facts of the German economy on the West German business cycles from 1955 to 1994. The method used in this investigation is Statist...
Constanze Pumplün, Claus Weihs, Andrea Preuss...
ECIS
2000
15 years 1 months ago
Open Source Movements as a Model for Organizing
Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let an...
Jan Ljungberg
112
Voted
DILS
2004
Springer
15 years 5 months ago
PROVA: Rule-Based Java-Scripting for a Bioinformatics Semantic Web
Abstract. Transparent information integration across distributed and heterogeneous data sources and computational tools is a prime concern for bioinformatics. Recently, there have ...
Alexander Kozlenkov, Michael Schroeder
MSR
2005
ACM
15 years 5 months ago
Using a clone genealogy extractor for understanding and supporting evolution of code clones
Programmers often create similar code snippets or reuse existing code snippets by copying and pasting. Code clones —syntactically and semantically similar code snippets—can ca...
Miryung Kim, David Notkin