Sciweavers

836 search results - page 161 / 168
» The Generalized Shape Distributions for Shape Matching and A...
Sort
View
111
Voted
SIGSOFT
2007
ACM
15 years 11 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
106
Voted
DOCENG
2006
ACM
15 years 4 months ago
Comparing XML path expressions
XPath is the standard declarative language for navigating XML data and returning a set of matching nodes. In the context of XSLT/XQuery analysis, query optimization, and XML type ...
Pierre Genevès, Nabil Layaïda
SIGSOFT
2003
ACM
15 years 11 months ago
Tracking pointers with path and context sensitivity for bug detection in C programs
This paper proposes a pointer alias analysis for automatic error detection. State-of-the-art pointer alias analyses are either too slow or too imprecise for finding errors in real...
V. Benjamin Livshits, Monica S. Lam
100
Voted
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
91
Voted
BMCBI
2010
161views more  BMCBI 2010»
14 years 10 months ago
BPDA - A Bayesian peptide detection algorithm for mass spectrometry
Background: Mass spectrometry (MS) is an essential analytical tool in proteomics. Many existing algorithms for peptide detection are based on isotope template matching and usually...
Youting Sun, Jianqiu Zhang, Ulisses Braga-Neto, Ed...