Sciweavers

1843 search results - page 37 / 369
» Securing Class Initialization
Sort
View
MSR
2006
ACM
15 years 8 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
DLS
2005
176views Languages» more  DLS 2005»
15 years 3 months ago
Dynamic data polyvariance using source-tagged classes
The DDP (Demand-driven/Pruning) analysis algorithm allows us to perform data-flow analyses of programming languages that are dynamically typed and have higher-order control flow...
S. Alexander Spoon, Olin Shivers
IJCNN
2006
IEEE
15 years 8 months ago
Non-Relevance Feedback Document Retrieval based on One Class SVM and SVDD
— This paper reports a new document retrieval method using non-relevant documents. Especially, this paper reports a comparison of retrieval efficiency between One Class Support ...
Takashi Onoda, Hiroshi Murata, Seiji Yamada
JSAT
2008
122views more  JSAT 2008»
15 years 1 months ago
SAT Algorithms for Colouring Some Special Classes of Graphs: Some Theoretical and Experimental Results
The local search algorithm GSAT is based on the notion of Satisfiability. It has been used successfully for colouring graphs, solving instances of the 3SAT problem, planning block...
Sriyankar Acharyya
IFIP
1992
Springer
15 years 6 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg