Sciweavers

3639 search results - page 35 / 728
» Provenance as Dependency Analysis
Sort
View
TACAS
2007
Springer
125views Algorithms» more  TACAS 2007»
15 years 3 months ago
Type-Dependence Analysis and Program Transformation for Symbolic Execution
Symbolic execution can be problematic when applied to real applications. This paper addresses two of these problems: (1) the constraints generated during symbolic execution may be ...
Saswat Anand, Alessandro Orso, Mary Jean Harrold
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
15 years 10 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
TELSYS
2002
122views more  TELSYS 2002»
14 years 9 months ago
Performance Analysis of Reassembly and Multiplexing Queueing with Long-Range-Dependent Input Traffic
This paper studies the impact of long-range-dependent (LRD) traffic on the performance of reassembly and multiplexing queueing. A queueing model characterizing the general reassemb...
George C. Lin, Tatsuya Suda, Fumio Ishizaki
CVPR
2011
IEEE
14 years 5 months ago
Multifactor Analysis Based on Factor-Dependent Geometry
This paper proposes a novel method that preserves the geometrical structure created by variation of multiple factors in analysis of multiple factor models, i.e., multifactor analy...
Sung Won Park
IPPS
2007
IEEE
15 years 4 months ago
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
This paper investigates the suitability of applying the general-purpose Real-Time Maude tool to the formal specification and model checking analysis of timedependent cryptographi...
Peter Csaba Ölveczky, Martin Grimeland