Sciweavers

95 search results - page 4 / 19
» The Software Similarity Problem in Malware Analysis
Sort
View
CSMR
2002
IEEE
14 years 9 days ago
Architecture-Centric Software Evolution by Software Metrics and Design Patterns
It is shown how software metrics and architectural patterns can be used for the management of software evolution. In the presented architecture-centric software evolutionmethod th...
Juha Gustafsson, Jukka Paakki, Lilli Nenonen, A. I...
ISW
2009
Springer
14 years 1 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
PADL
2010
Springer
14 years 4 months ago
Similar Code Detection and Elimination for Erlang Programs
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is the existence of code clones, which are code fragments that are identical or similar...
Huiqing Li, Simon Thompson
BIODATAMINING
2008
96views more  BIODATAMINING 2008»
13 years 7 months ago
Fast approximate hierarchical clustering using similarity heuristics
Background: Agglomerative hierarchical clustering (AHC) is a common unsupervised data analysis technique used in several biological applications. Standard AHC methods require that...
Meelis Kull, Jaak Vilo
WCRE
2003
IEEE
14 years 19 days ago
Problems Creating Task-relevant Clone Detection Reference Data
One prevalent method for evaluating the results of automated software analysis tools is to compare the tools’ output to the judgment of human experts. This evaluation strategy i...
Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yan...