Sciweavers

206 search results - page 17 / 42
» Code clone detection in practice
Sort
View
DAGSTUHL
2006
13 years 11 months ago
Program Compression
Abstract. The talk focused on a grammar-based technique for identifying redundancy in program code and taking advantage of that redundancy to reduce the memory required to store an...
William S. Evans
BMCBI
2011
13 years 1 months ago
Proportion statistics to detect differentially expressed genes: a comparison with log-ratio statistics
Background: In genetic transcription research, gene expression is typically reported in a test sample relative to a reference sample. Laboratory assays that measure gene expressio...
Tracy L. Bergemann, Jason Wilson
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
14 years 1 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
GECCO
2008
Springer
116views Optimization» more  GECCO 2008»
13 years 11 months ago
Evolving similarity functions for code plagiarism detection
Students are often asked to submit electronic copies of their program code as part of assessment in computer science courses. To counter code plagiarism, educational institutions ...
Victor Ciesielski, Nelson Wu, Seyed M. M. Tahaghog...