Software reuse is only effective if it is easier to locate (and appropriately modify) a reusable component than to write it from scratch. We present signature matching as a method for achieving this goal by using signature information easily derived from the component. We consider two kinds of software components, functions and modules, and hence two kinds of matching, function matching and module matching. The signature of a function is simply its type; the signature of a module is a multiset of user-defined types and a multiset of function signatures. For both functions and modules, we consider not just exact match, but also various flavors of relaxed match. We briefly describe an experimental facility written in Standard ML for performin...
In this chapter the authentication performances achievable by on-line signature recognition systems ...
Retrieval of software components from a library relies on techniques for matching user requirements ...
In this paper we present a language for programming with higher-order modules.y The language, HML, i...
In this project, we develop a tool which compares two Spec# programs (C# code with specification con...
A method for efficiently generating signatures for detecting library functions in executable files i...
Deployed software systems are typically composed of many pieces, not all of which may have been crea...
When a successful software system is maintained and evolved for an extended period of time, original...
CARE provides a framework for construction and verification of programs, based around the recording ...
It is often difficult to obtain sufficient signature samples to train up a signature verification sy...
In this paper we present a new matching method called Tuple Matching (TM), which is an algorithm for...
Although Software Verification technology is rapidly advancing, the process of formally specifying t...
This paper proposes a method to calculate similarities of software without any source code informati...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection proced...
Copyright © 2001, IEEEFormal specifications have been proposed as a basis for accessing reusable com...
In this chapter the authentication performances achievable by on-line signature recognition systems ...
Retrieval of software components from a library relies on techniques for matching user requirements ...
In this paper we present a language for programming with higher-order modules.y The language, HML, i...
In this project, we develop a tool which compares two Spec# programs (C# code with specification con...
A method for efficiently generating signatures for detecting library functions in executable files i...
Deployed software systems are typically composed of many pieces, not all of which may have been crea...
When a successful software system is maintained and evolved for an extended period of time, original...
CARE provides a framework for construction and verification of programs, based around the recording ...
It is often difficult to obtain sufficient signature samples to train up a signature verification sy...
In this paper we present a new matching method called Tuple Matching (TM), which is an algorithm for...
Although Software Verification technology is rapidly advancing, the process of formally specifying t...
This paper proposes a method to calculate similarities of software without any source code informati...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection proced...
Copyright © 2001, IEEEFormal specifications have been proposed as a basis for accessing reusable com...
In this chapter the authentication performances achievable by on-line signature recognition systems ...
Retrieval of software components from a library relies on techniques for matching user requirements ...
In this paper we present a language for programming with higher-order modules.y The language, HML, i...