Sciweavers

988 search results - page 61 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
COCO
1991
Springer
112views Algorithms» more  COCO 1991»
14 years 14 days ago
Randomized vs.Deterministic Decision Tree Complexity for Read-Once Boolean Functions
We consider the deterministic and the randomized decision tree complexities for Boolean functions, denoted DC(f) and RC(f), respectively. A major open problem is how small RC(f) ca...
Rafi Heiman, Avi Wigderson
BMCBI
2008
93views more  BMCBI 2008»
13 years 9 months ago
VirulentPred: a SVM based prediction method for virulent proteins in bacterial pathogens
Background: Prediction of bacterial virulent protein sequences has implications for identification and characterization of novel virulence-associated factors, finding novel drug/v...
Aarti Garg, Dinesh Gupta
ICSE
2000
IEEE-ACM
14 years 16 days ago
An empirical study of regression test application frequency
Regression testing is an expensive maintenance process used to revalidate modified software. Regression test selection (RTS) techniques attempt to reduce the cost of regression te...
Jung-Min Kim, Adam A. Porter, Gregg Rothermel
CIDM
2007
IEEE
13 years 9 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
KBSE
2009
IEEE
14 years 3 months ago
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Suresh Thummalapenta, Tao Xie