Sciweavers

416 search results - page 70 / 84
» Intellectual Property and Open Systems
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 7 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler

Source Code
579views
14 years 3 months ago
The CImg Library
The CImg Library is an open source, C++ toolkit for image processing, designed with these properties in mind : Usefulness CImg defines classes and methods to manage images in y...
David Tschumperlé
ICCS
2009
Springer
14 years 1 months ago
Distinguishing Answers in Conceptual Graph Knowledge Bases
Abstract. In knowledge bases, the open world assumption and the ability to express variables may lead to an answer redundancy problem. This problem occurs when the returned answers...
Nicolas Moreau, Michel Leclère, Madalina Cr...
MSR
2011
ACM
12 years 10 months ago
Do time of day and developer experience affect commit bugginess
Modern software is often developed over many years with hundreds of thousands of commits. Commit metadata is a rich source of social characteristics, including the commit’s time...
Jon Eyolfson, Lin Tan, Patrick Lam