Sciweavers

1636 search results - page 95 / 328
» Detecting similar software applications
Sort
View
ICAC
2006
IEEE
15 years 10 months ago
A Runtime Adaptation Framework for Native C and Bytecode Applications
— The need for self-healing software to respond with a reactive, proactive or preventative action as a result of changes in its environment has added the non-functional requireme...
Rean Griffith, Gail E. Kaiser
ICPR
2002
IEEE
16 years 5 months ago
Object Detection in Images: Run-Time Complexity and Parameter Selection of Support Vector Machines
In this paper we address two aspects related to the exploitation of Support Vector Machines (SVM) for classification in real application domains, such as the detection of objects ...
Nicola Ancona, Grazia Cicirelli, Ettore Stella, Ar...
ICPR
2002
IEEE
16 years 5 months ago
A Ball Detection Algorithm for Real Soccer Image Sequences
A large number of methods for circle detection has been studied in the last years for numerous image processing applications. The application domain considered in this paper is th...
Tiziana D'Orazio, Nicola Ancona, Grazia Cicirelli,...
ETRICS
2006
15 years 8 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
MSR
2009
ACM
15 years 11 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...