Sciweavers

1143 search results - page 97 / 229
» Extraction in software watermarking
Sort
View
POPL
2012
ACM
12 years 4 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...
IEEEARES
2010
IEEE
14 years 2 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
IJSEKE
2006
138views more  IJSEKE 2006»
13 years 9 months ago
Towards Automatic Establishment of Model Dependencies Using Formal Concept Analysis
tion and alteration of software models at different levels of abstraction. These modifications are usually performed independently, but the objects to which they are applied to, ar...
Igor Ivkovic, Kostas Kontogiannis
SIGSOFT
2009
ACM
14 years 9 months ago
Engineering search computing applications: vision and challenges
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Marco Brambilla, Stefano Ceri
IWPC
2006
IEEE
14 years 3 months ago
Digging the Development Dust for Refactorings
Software repositories are rich sources of information about the software development process. Mining the information stored in them has been shown to provide interesting insights ...
Curtis Schofield, Brendan Tansey, Zhenchang Xing, ...