Sciweavers

1629 search results - page 193 / 326
» Infeasible Code Detection
Sort
View
CORR
2011
Springer
184views Education» more  CORR 2011»
14 years 8 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom

Source Code
2231views
16 years 7 months ago
The Berkeley Segmentation Engine (BSE)
The code is a (good, in my opinion) implementation of a segmentation engine based on normalised cuts (a spectral clustering algorithm) and a pixel affinity matrix calculation algor...
Charless Fowlkes
ICSE
2004
IEEE-ACM
16 years 1 months ago
Generating Tests from Counterexamples
We have extended the software model checker BLAST to automatically generate test suites that guarantee full coverage with respect to a given predicate. More precisely, given a C p...
Dirk Beyer, Adam J. Chlipala, Thomas A. Henzinger,...
ESEM
2009
ACM
15 years 8 months ago
Cognitive factors in perspective-based reading (PBR): A protocol analysis study
The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the proto...
Bryan Robbins, Jeff Carver
ACSC
2007
IEEE
15 years 8 months ago
Jooj: Real-Time Support For Avoiding Cyclic Dependencies
The design guideline avoid dependency cycles among modules was first alluded to by Parnas in 1978. Many tools have since been built to detect cyclic dependencies among a programā...
Hayden Melton, Ewan D. Tempero