Sciweavers

6149 search results - page 225 / 1230
» Revealing the programming process
Sort
View
153
Voted
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 5 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
MODELS
2009
Springer
15 years 11 months ago
Feature-oriented programming with Ruby
Features identify core characteristics of software in order to produce families of programs. Through configuration, different variants of a program can be composed. Our approach...
Sebastian Günther, Sagar Sunkle
WCRE
2008
IEEE
15 years 11 months ago
Integrative Levels of Program Comprehension
Integrative levels of program comprehension describe the evolution of our knowledge about a program from low-level program elements through successive and higher orders of knowled...
Reinhard Schauer, Rudolf K. Keller
AVI
2004
15 years 6 months ago
Visualizing programs with Jeliot 3
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...
Andrés Moreno, Niko Myller, Erkki Sutinen, ...
HASE
2007
IEEE
15 years 11 months ago
On the Verifiability of Programs Written in the Feature Language Extensions
High assurance in embedded system software is difficult to attain. Verification relies on testing. The unreliable and costly testing process is made much worse because the softwar...
Wu-Hon F. Leung