Sciweavers

4722 search results - page 191 / 945
» Representation-independent program analysis
Sort
View
ICSM
1994
IEEE
14 years 1 months ago
A Change Analysis Process to Characterize Software Maintenance Projects
In order to improve software maintenance processes, we need to be able to first characterize and assess them. This task needs to be performed in depth and with objectivity since t...
Lionel C. Briand, Victor R. Basili, Yong-Mi Kim, D...
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
14 years 4 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
NDSS
2008
IEEE
14 years 4 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ASP
2005
Springer
14 years 3 months ago
Intelligence Analysis Using Quantitative Preferences
The extended answer set semantics for simple logic programs, i.e. programs with only classical negation, allows for the defeat of rules to resolve contradictions. In addition, a pa...
Davy Van Nieuwenborgh, Stijn Heymans, Dirk Vermeir
LPAR
2004
Springer
14 years 3 months ago
Weighted Answer Sets and Applications in Intelligence Analysis
The extended answer set semantics for simple logic programs, i.e. programs with only classical negation, allows for the defeat of rules to resolve contradictions. In addition, a pa...
Davy Van Nieuwenborgh, Stijn Heymans, Dirk Vermeir