Sciweavers

677 search results - page 89 / 136
» Reverse Engineering Super-Repositories
Sort
View
OOPSLA
2010
Springer
13 years 7 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
VL
2010
IEEE
209views Visual Languages» more  VL 2010»
13 years 7 months ago
Automatically Inferring ClassSheet Models from Spreadsheets
Many errors in spreadsheet formulas can be avoided if spreadsheets are built automatically from higher-level models that can encode and enforce consistency constraints. However, d...
Jacome Cunha, Martin Erwig, Joao Saraiva
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
14 years 9 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
HOST
2008
IEEE
14 years 3 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
WSE
2003
IEEE
14 years 2 months ago
Using Keyword Extraction for Web Site Clustering
Reverse engineering techniques have the potential to support Web site understanding, by providing views that show the organization of a site and its navigational structure. Howeve...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...