Sciweavers

1173 search results - page 63 / 235
» Program Derivation Using Analogy
Sort
View
NDSS
2008
IEEE
15 years 9 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
144
Voted
FBIT
2007
IEEE
15 years 9 months ago
Developmental Evaluation in Genetic Programming: A Position Paper
—Standard genetic programming genotypes are generally highly disorganized and poorly structured, with little code replication. This is also true of existing developmental genetic...
Tuan Hao Hoang, Robert I. McKay, Daryl Essam, Nguy...
127
Voted
ICLP
1995
Springer
15 years 6 months ago
Operational Semantics of Constraint Logic Programs with Coroutining
The semantics of constraint logic programming languages with coroutining facilities (\freeze," suspension, residuation, etc.) cannot be fully declarative; thus, an operationa...
Andreas Podelski, Gert Smolka
SAINT
2005
IEEE
15 years 8 months ago
Inductive Logic Programming for Structure-Activity Relationship Studies on Large Scale Data
Inductive Logic Programming (ILP) is a combination of inductive learning and first-order logic aiming to learn first-order hypotheses from training examples. ILP has a serious b...
Cholwich Nattee, Sukree Sinthupinyo, Masayuki Numa...
PLDI
1997
ACM
15 years 6 months ago
Componential Set-Based Analysis
Set-based analysis is a constraint-based whole program analysis that is applicable to functional and objectoriented programming languages. Unfortunately, the analysis is useless f...
Cormac Flanagan, Matthias Felleisen