Sciweavers

787 search results - page 48 / 158
» Source code analysis and manipulation
Sort
View
EUROMICRO
2005
IEEE
15 years 3 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
ICSM
2005
IEEE
15 years 3 months ago
Dynamic Feature Traces: Finding Features in Unfamiliar Code
This paper introduces an automated technique for feature location: helping developers map features to relevant source code. Like several other automated feature location technique...
Andrew David Eisenberg, Kris De Volder
TCBB
2008
102views more  TCBB 2008»
14 years 9 months ago
Identification of Protein Coding Regions Using the Modified Gabor-Wavelet Transform
An important topic in genomic sequence analysis is the identification of protein coding regions. In this context, several coding DNA model-independent methods based on the occurren...
Jesus P. Mena-Chalco, Helaine Carrer, Yossi Zana, ...
ICASSP
2010
IEEE
14 years 10 months ago
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images
Image spam is an email spam that embeds text content into graphical images to bypass traditional spam filters. The majority of previous approaches focus on filtering image spam ...
Yan Gao, Alok N. Choudhary, Gang Hua
SCAM
2005
IEEE
15 years 3 months ago
Fine-Grained Analysis of Change Couplings
In software evolution analysis, many approaches analyze release history data available through versioning systems. The recent investigations of CVS data have shown that commonly c...
Beat Fluri, Harald Gall, Martin Pinzger