Sciweavers

1636 search results - page 131 / 328
» Detecting similar software applications
Sort
View
ISSTA
2012
ACM
13 years 7 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue
BMCBI
2008
154views more  BMCBI 2008»
15 years 4 months ago
GenomeMatcher: A graphical user interface for DNA sequence comparison
Background: The number of available genome sequences is increasing, and easy-to-use software that enables efficient comparative analysis is needed. Results: We developed GenomeMat...
Yoshiyuki Ohtsubo, Wakako Ikeda-Ohtsubo, Yuji Naga...
CCS
2007
ACM
15 years 11 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
ISAAC
2004
Springer
115views Algorithms» more  ISAAC 2004»
15 years 10 months ago
Randomized Algorithms for Motif Detection
Motivation: Motif detection for DNA sequences has many important applications in biological studies, e.g., locating binding sites and regulatory signals, and designing genetic prob...
Lusheng Wang, Liang Dong, Hui Fan
ASPLOS
2011
ACM
14 years 8 months ago
ConSeq: detecting concurrency bugs through sequential errors
Concurrency bugs are caused by non-deterministic interleavings between shared memory accesses. Their effects propagate through data and control dependences until they cause softwa...
Wei Zhang, Junghee Lim, Ramya Olichandran, Joel Sc...