Sciweavers

1629 search results - page 46 / 326
» Infeasible Code Detection
Sort
View
MSR
2006
ACM
14 years 4 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
ECOOP
2007
Springer
14 years 2 months ago
Automation of Refactoring and Refactoring Suggestions for TTCN-3 Test Suites. The TRex TTCN-3 Refactoring and Metrics Tool
Refactoring is not only useful for source code of implementations, but as well for test specifications. The open source TRex tool automates the application of refactorings and the ...
Helmut Neukirchen, Benjamin Zeiss
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
14 years 3 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
IPPS
2007
IEEE
14 years 4 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
ICC
2007
IEEE
14 years 4 months ago
Robust Code Acquisition in the Presence of BOC Modulation for Future Galileo Receivers
— The problem of code acquisition for the Galileo system is investigated in this paper. The effect of non-ideal sampling on the Binary Offset Carrier (BOC) modulated signal is ev...
Marco Villanti, Claudio Palestini, Raffaella Pedon...