Sciweavers

1636 search results - page 37 / 328
» Detecting similar software applications
Sort
View
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 6 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
ICSE
2011
IEEE-ACM
13 years 2 days ago
Inconsistent path detection for XML IDEs
We present the first IDE augmented with static detection of inconsistent paths for simplifying the development and debugging of any application involving XPath expressions. Categ...
Pierre Genevès, Nabil Layaïda
WCRE
1999
IEEE
14 years 27 days ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
EMSOFT
2005
Springer
14 years 2 months ago
Testing real-time embedded software using UPPAAL-TRON: an industrial case study
UPPAAL-TRON is a new tool for model based online black-box conformance testing of real-time embedded systems specified as timed automata. In this paper we present our experiences...
Kim Guldstrand Larsen, Marius Mikucionis, Brian Ni...
IPPS
2008
IEEE
14 years 3 months ago
Outlier detection in performance data of parallel applications
— When an adaptive software component is employed to select the best-performing implementation for a communication operation at runtime, the correctness of the decision taken str...
Katharina Benkert, Edgar Gabriel, Michael M. Resch