Sciweavers

1636 search results - page 135 / 328
» Detecting similar software applications
Sort
View
KDD
2004
ACM
182views Data Mining» more  KDD 2004»
16 years 5 months ago
Rotation invariant distance measures for trajectories
For the discovery of similar patterns in 1D time-series, it is very typical to perform a normalization of the data (for example a transformation so that the data follow a zero mea...
Michail Vlachos, Dimitrios Gunopulos, Gautam Das
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 10 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
QSIC
2005
IEEE
15 years 10 months ago
Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach
We propose a software requirements analysis method based on domain ontology technique, where we can establish a mapping between a software requirements specification and the doma...
Haruhiko Kaiya, Motoshi Saeki
SIGSOFT
2007
ACM
16 years 5 months ago
Using groupings of static analysis alerts to identify files likely to contain field failures
In this paper, we propose a technique for leveraging historical field failure records in conjunction with automated static analysis alerts to determine which alerts or sets of ale...
Mark Sherriff, Sarah Smith Heckman, J. Michael Lak...
SOSP
2007
ACM
16 years 1 months ago
AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications
The rise of the software-as-a-service paradigm has led to the development of a new breed of sophisticated, interactive applications often called Web 2.0. While web applications ha...
Emre Kiciman, V. Benjamin Livshits