Sciweavers

1636 search results - page 48 / 328
» Detecting similar software applications
Sort
View
CVPR
2010
IEEE
14 years 4 months ago
Spatialized Epitome and Its Applications
Due to the lack of explicit spatial consideration, existing epitome model may fail for image recognition and target detection, which directly motivates us to propose the so-calle...
Xinqi Chu, Shuicheng Yan, Liyuan Li, Kap Luk Chan,...
IWPSE
2003
IEEE
14 years 1 months ago
Beyond the Refactoring Browser: Advanced Tool Support for Software Refactoring
Current refactoring tools only provide support for performing selected refactorings. We show how tool support can be provided for the preparatory phases of refactoring as well, by...
Tom Mens, Tom Tourwé, Francisca Muño...
DIMVA
2009
13 years 9 months ago
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
Jin Han, Debin Gao, Robert H. Deng
ICSE
2008
IEEE-ACM
14 years 8 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
ECLIPSE
2004
ACM
14 years 2 months ago
Workspace awareness in application development
Coordination of development activities is often the most crucial success factor in a software development team. Typically, teams rely on configuration management (CM) systems for...
Roger M. Ripley, Ryan Y. Yasui, Anita Sarma, Andr&...