Sciweavers

787 search results - page 23 / 158
» Source code analysis and manipulation
Sort
View
WCRE
2008
IEEE
15 years 4 months ago
Automated Concept Location Using Independent Component Analysis
Concept location techniques are designed to help isolate sections of source code that relate to specific concepts. Blind Signal Separation techniques like Singular Value Decompos...
Scott Grant, James R. Cordy, David B. Skillicorn
WETICE
1999
IEEE
15 years 1 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
77
Voted
ICONIP
2007
14 years 11 months ago
Flexible Component Analysis for Sparse, Smooth, Nonnegative Coding or Representation
In the paper, we present a new approach to multi-way Blind Source Separation (BSS) and corresponding 3D tensor factorization that has many potential applications in neuroscience an...
Andrzej Cichocki, Anh Huy Phan, Rafal Zdunek, Liqi...
ICSM
2009
IEEE
15 years 4 months ago
Searching and skimming: An exploratory study
Source code search is an important activity for programmers working on a change task to a software system. As part of a larger project to improve tool support for finding informa...
Jamie Starke, Chris Luce, Jonathan Sillito
POPL
1998
ACM
15 years 1 months ago
Alias Analysis of Executable Code
Recent years have seen increasing interest in systems that reason about and manipulate executable code. Such systems can generally benefit from information about aliasing. Unfort...
Saumya K. Debray, Robert Muth, Matthew Weippert