Sciweavers

1485 search results - page 6 / 297
» Whole Program Paths
Sort
View
KBSE
2007
IEEE
14 years 1 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
BMCBI
2010
109views more  BMCBI 2010»
13 years 7 months ago
Pripper: prediction of caspase cleavage sites from whole proteomes
Background: Caspases are a family of proteases that have central functions in programmed cell death (apoptosis) and inflammation. Caspases mediate their effects through aspartate-...
Mirva Piippo, Niina Lietzén, Olli Nevalaine...
APLAS
2008
ACM
13 years 9 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Exception-Chain Analysis: Revealing Exception Handling Architecture in Java Server Applications
Although it is common in large Java programs to rethrow exceptions, existing exception-flow analyses find only single exceptionflow links, thus are unable to identify multiple-lin...
Chen Fu, Barbara G. Ryder
INFOCOM
2009
IEEE
14 years 2 months ago
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various o...
Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wa...