Sciweavers

766 search results - page 36 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
IWPC
2000
IEEE
14 years 4 days ago
Tracing Object-Oriented Code into Functional Requirements
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual page...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
WWW
2010
ACM
14 years 2 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ACMSE
2008
ACM
13 years 9 months ago
Profiler instrumentation using metaprogramming techniques
Software developers are frequently required to address evolving stakeholder concerns, which often result in changes to the source code of an application. Manually performing invas...
Ritu Arora, Yu Sun, Zekai Demirezen, Jeff Gray
ACSAC
2005
IEEE
14 years 1 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
ICDAR
2003
IEEE
14 years 1 months ago
Word Searching in CCITT Group 4 Compressed Document Images
In this paper, we present a compressed pattern matching method for searching user queried words in the CCITT Group 4 compressed document images, without decompressing. The feature...
Yue Lu, Chew Lim Tan