Sciweavers

1821 search results - page 322 / 365
» Security-Aware Program Transformations
Sort
View
FROCOS
2007
Springer
14 years 3 months ago
Termination of Innermost Context-Sensitive Rewriting Using Dependency Pairs
Abstract. Innermost context-sensitive rewriting has been proved useful for modeling computations of programs of algebraic languages like Maude, OBJ, etc. Furthermore, innermost ter...
Beatriz Alarcón, Salvador Lucas
GECCO
2007
Springer
209views Optimization» more  GECCO 2007»
14 years 3 months ago
Kernel based automatic clustering using modified particle swarm optimization algorithm
This paper introduces a method for clustering complex and linearly non-separable datasets, without any prior knowledge of the number of naturally occurring clusters. The proposed ...
Ajith Abraham, Swagatam Das, Amit Konar
WADS
2007
Springer
155views Algorithms» more  WADS 2007»
14 years 3 months ago
Constant Factor Approximations for the Hotlink Assignment Problem
An approach for reducing the navigation effort for the users of a web site is to enhance its hyperlink structure with additional hotlinks. We address the task of adding at most on...
Tobias Jacobs
ACSAC
2006
IEEE
14 years 2 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
CSMR
2006
IEEE
14 years 2 months ago
A Language Independent Framework for Context-sensitive Formatting
Automated formatting is an important technique for the software maintainer. It is either applied separately to improve the readability of source code, or as part of a source code ...
M. G. J. van den Brand, A. Taeke Kooiker, Jurgen J...