Sciweavers

1636 search results - page 102 / 328
» Detecting similar software applications
Sort
View
CCS
2009
ACM
15 years 8 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
SCAM
2008
IEEE
15 years 11 months ago
Fast and Precise Points-to Analysis
—Many software engineering applications require points-to analysis. Client applications range from optimizing compilers to program development and testing environments to reverse...
Jonas Lundberg, Tobias Gutzmann, Welf Löwe
AIPR
2008
IEEE
15 years 11 months ago
Temporal structure methods for image-based change analysis
– This paper addresses the exploitation of massive numbers of image-derived change detections. We use the term “change analysis” to emphasize the intelligence value obtained ...
Ray Rimey, Dan Keefe
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 4 months ago
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation ...
Julie Greensmith, Jan Feyereisl, Uwe Aickelin
SIGSOFT
2008
ACM
16 years 5 months ago
Inter-context control-flow and data-flow test adequacy criteria for nesC applications
NesC is a programming language for applications that run on top of networked sensor nodes. Such an application mainly uses an interrupt to trigger a sequence of operations, known ...
Zhifeng Lai, Shing-Chi Cheung, Wing Kwong Chan