Sciweavers

1629 search results - page 74 / 326
» Infeasible Code Detection
Sort
View
ESEM
2008
ACM
14 years 11 months ago
Are good code reviewers also good at design review?
Software review is a necessity activity to build high reliability software in software development. In this paper, we experimentally analyze the difference in performance between ...
Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto
FASE
2009
Springer
15 years 1 months ago
Mining API Error-Handling Specifications from Source Code
Abstract. API error-handling specifications are often not documented, necessitating automated specification mining. Automated mining of error-handling specifications is challenging...
Mithun Acharya, Tao Xie
IJCV
2008
139views more  IJCV 2008»
14 years 9 months ago
Multilevel Image Coding with Hyperfeatures
Histograms of local appearance descriptors are a popular representation for visual recognition. They are highly discriminant with good resistance to local occlusions and to geomet...
Ankur Agarwal, Bill Triggs
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 1 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
DAGSTUHL
2006
14 years 11 months ago
Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity
Abstract. An original method of spectral similarity analysis for plagiarism detection in university project is presented. The approach is based on a clone detection tool called CLA...
Ettore Merlo