Sciweavers

2152 search results - page 351 / 431
» On Automating the Calculus of Relations
Sort
View
93
Voted
WCRE
2008
IEEE
15 years 7 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
85
Voted
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 7 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
99
Voted
ACSAC
2007
IEEE
15 years 7 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
114
Voted
AGILEDC
2007
IEEE
15 years 7 months ago
On the Sustained Use of a Test-Driven Development Practice at IBM
Test-Driven Development (TDD) is an agile practice that is widely accepted and advocated by most agile methods and methodologists. In this paper, we report on a post hoc analysis ...
Julio Cesar Sanchez, Laurie A. Williams, E. Michae...
103
Voted
AVSS
2007
IEEE
15 years 7 months ago
Detecting shopper groups in video sequences
We present a generalized extensible framework for automated recognition of swarming activities in video sequences. The trajectory of each individual is produced by the visual trac...
Alex Leykin, Mihran Tuceryan