Sciweavers

1636 search results - page 18 / 328
» Detecting similar software applications
Sort
View
ICSE
2000
IEEE-ACM
14 years 5 days ago
A software engineering approach and tool set for developing Internet applications
If a business built a plant to produce products without first designing a process to manufacture them, the risk would be lack of capacity without significant plant redesign. Simil...
David A. Marca, Beth A. Perdue
ASSETS
2008
ACM
13 years 10 months ago
MySpeechWeb: software to facilitate the construction and deployment of speech applications on the web
Few voice-in/voice-out applications are available on the web. The problem appears to be the lack of appropriate open-source tools. More speech applications would increase the func...
Richard A. Frost, Ali Karaki, David A. Dufour, Jos...
ICIW
2009
IEEE
13 years 6 months ago
Detecting Ontology Mappings via Descriptive Statistical Methods
Instance-based ontology mapping comprises a collection of theoretical approaches and applications for identifying the implicit semantic similarities between two ontologies on the ...
Konstantin Todorov
ICSE
2008
IEEE-ACM
14 years 9 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li