Sciweavers

570 search results - page 89 / 114
» From Program Verification to Program Synthesis
Sort
View
125
Voted
WORM
2003
15 years 3 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
SIGSOFT
2010
ACM
15 years 1 days ago
Software economies
Software construction has typically drawn on engineering metaphors like building bridges or cathedrals, which emphasize architecture, specification, central planning, and determin...
David F. Bacon, Eric Bokelberg, Yiling Chen, Ian A...
147
Voted
SIGSOFT
2003
ACM
16 years 2 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
121
Voted
ICCV
2003
IEEE
16 years 4 months ago
View-invariant Alignment and Matching of Video Sequences
In this paper, we propose a novel method to establish temporal correspondence between the frames of two videos. 3D epipolar geometry is used to eliminate the distortion generated ...
Cen Rao, Alexei Gritai, Mubarak Shah, Tanveer Fath...
135
Voted
ECBS
2006
IEEE
166views Hardware» more  ECBS 2006»
15 years 8 months ago
Model Transformations in the Model-Based Development of Real-time Systems
In this paper we argue for UML-based metamodeling and pattern-based graph transformation techniques in computer-based systems development through an illustrative example from the ...
Tivadar Szemethy, Gabor Karsai, Daniel Balasubrama...