Sciweavers

412 search results - page 61 / 83
» Incremental Clone Detection
Sort
View
JCS
2011
138views more  JCS 2011»
12 years 11 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
MICRO
2005
IEEE
145views Hardware» more  MICRO 2005»
14 years 1 months ago
A Mechanism for Online Diagnosis of Hard Faults in Microprocessors
We develop a microprocessor design that tolerates hard faults, including fabrication defects and in-field faults, by leveraging existing microprocessor redundancy. To do this, we...
Fred A. Bower, Daniel J. Sorin, Sule Ozev
ICSE
2001
IEEE-ACM
14 years 13 days ago
Improving Validation Activities in a Global Software Development
Global software development challenges traditional techniques of software engineering, such as peer reviews or teamwork. Effective teamwork and coaching of engineers highly contri...
Christof Ebert, Casimiro Hernandez Parro, Roland S...
24
Voted
CP
2008
Springer
13 years 9 months ago
CPBPV: A Constraint-Programming Framework for Bounded Program Verification
Abstract. This paper studies how to verify the conformity of a program with its specification and proposes a novel constraint-programming framework for bounded program verification...
Hélène Collavizza, Michel Rueher, Pa...
ICML
2005
IEEE
14 years 8 months ago
Interactive learning of mappings from visual percepts to actions
We introduce flexible algorithms that can automatically learn mappings from images to actions by interacting with their environment. They work by introducing an image classifier i...
Justus H. Piater, Sébastien Jodogne