Sciweavers

1629 search results - page 23 / 326
» Infeasible Code Detection
Sort
View
COMPSAC
2004
IEEE
14 years 1 months ago
N-Gram-Based Detection of New Malicious Code
The current commercial anti-virus software detects a virus only after the virus has appeared and caused damage. Motivated by the standard signature-based technique for detecting v...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
DFT
2003
IEEE
246views VLSI» more  DFT 2003»
14 years 3 months ago
Low Cost Convolutional Code Based Concurrent Error Detection in FSMs
We discuss the use of convolutional codes to perform concurrent error detection (CED) in finite state machines (FSMs). We examine a previously proposed methodology, we identify i...
Konstantinos Rokas, Yiorgos Makris, Dimitris Gizop...
ICMCS
2007
IEEE
79views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Pop Music Beat Detection in the Huffman Coded Domain
This paper presents a novel beat detector that operates in the Huffman coded domain of a MP3 audio bitstream. We seek to answer two main questions. First, whether it is possible t...
Jia Zhu, Ye Wang
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICSE
2007
IEEE-ACM
14 years 10 months ago
STRADA: A Tool for Scenario-Based Feature-to-Code Trace Detection and Analysis
Software engineers frequently struggle with understanding the relationships between the source code of a system and its requirements or high-level features. These relationships ar...
Alexander Egyed, Gernot Binder, Paul Grünbach...