Sciweavers

406 search results - page 43 / 82
» Identifying Codes and Covering Problems
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
WEBI
2001
Springer
14 years 1 months ago
Knowledge-Based Validation, Aggregation, and Visualization of Meta-data: Analyzing a Web-Based Information System
As meta-data become of ever more importance to the Web, we will need to start managing such meta-data. We argue that there is a strong need for meta-data validation and aggregation...
Heiner Stuckenschmidt, Frank van Harmelen
GCSE
2000
Springer
14 years 8 days ago
Product Instantiation in Software Product Lines: A Case Study
Product instantiation is one of the less frequently studied activities in the domain of software product lines. In this paper, we present the results of a case study at Axis Commu...
Jan Bosch, Mattias Högström
ECCV
2010
Springer
13 years 11 months ago
Practical Methods For Convex Multi-View Reconstruction
Globally optimal formulations of geometric computer vision problems comprise an exciting topic in multiple view geometry. These approaches are unaffected by the quality of a provid...
CSMR
2009
IEEE
14 years 3 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou