Sciweavers

1629 search results - page 173 / 326
» Infeasible Code Detection
Sort
View
ACSAC
2009
IEEE
15 years 8 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ICC
2007
IEEE
175views Communications» more  ICC 2007»
15 years 8 months ago
An Adaptive MIMO System Based on Unified Belief Propagation Detection
—An adaptive multiple input and multiple output with the code matrix index feedback [8]. One detector will (MIMO) system based on the unified belief propagation (BP) work in the ...
Xiumei Yang, Yong Xiong, Fan Wang
ISW
2007
Springer
15 years 7 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
WAW
2004
Springer
178views Algorithms» more  WAW 2004»
15 years 7 months ago
Communities Detection in Large Networks
We develop an algorithm to detect community structure in complex networks. The algorithm is based on spectral methods and takes into account weights and links orientations. Since t...
Andrea Capocci, Vito Domenico Pietro Servedio, Gui...
ISSTA
2010
ACM
15 years 5 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su