Sciweavers

1629 search results - page 31 / 326
» Infeasible Code Detection
Sort
View
SCAM
2008
IEEE
14 years 4 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
INTELLCOMM
2004
Springer
14 years 3 months ago
An Implementation of Indoor Location Detection Systems Based on Identifying Codes
We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beac...
Rachanee Ungrangsi, Ari Trachtenberg, David Starob...
PIMRC
2010
IEEE
13 years 8 months ago
On the detection probability of parallel code phase search algorithms in GPS receivers
The first stage of the signal processing chain in a Global Positioning System (GPS) receiver is the acquisition, which provides for a desired satellite coarse code phase and Dopple...
Bernhard Geiger, Michael Soudan, Christian Vogel
KBSE
2009
IEEE
14 years 4 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
CIKM
2009
Springer
14 years 4 months ago
Tree-pattern-based duplicate code detection
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...
Hyo-Sub Lee, Kyung-Goo Doh