Sciweavers

667 search results - page 77 / 134
» On Various Negative Translations
Sort
View
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
INFOCOM
2008
IEEE
15 years 4 months ago
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System
— While the concept of collaboration provides a natural defense against massive spam emails directed at large numbers of recipients, designing effective collaborative anti-spam s...
Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li
SCAM
2008
IEEE
15 years 4 months ago
Parfait - A Scalable Bug Checker for C Code
Parfait is a bug checker of C code that has been designed to address developers’ requirements of scalability (support millions of lines of code in a reasonable amount of time), ...
Cristina Cifuentes
EUROMICRO
2007
IEEE
15 years 4 months ago
Perceived Effects of Pair Programming in an Industrial Context
We studied the perceived effects of pair programming (PP) compared to solo programming in a large scale, industrial software development context. We surveyed developers (N=28) reg...
Jari Vanhanen, Pekka Abrahamsson
ISW
2007
Springer
15 years 4 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...