分期 发表于 2025-3-21 19:06:56

书目名称Software Similarity and Classification影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0871031<br><br>        <br><br>书目名称Software Similarity and Classification读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0871031<br><br>        <br><br>

ANIM 发表于 2025-3-21 20:40:25

Introduction,tware theft detection, plagiarism detection and code clone detection. The motivations for these applications are examined and an underlying theory is formalized. This theory is based on extracting signatures from programs, known as birthmarks, that are amenable to approximate matching that tells us

小口啜饮 发表于 2025-3-22 03:15:44

http://reply.papertrans.cn/88/8711/871031/871031_3.png

现存 发表于 2025-3-22 07:24:09

http://reply.papertrans.cn/88/8711/871031/871031_4.png

arbovirus 发表于 2025-3-22 12:15:10

http://reply.papertrans.cn/88/8711/871031/871031_5.png

Barter 发表于 2025-3-22 13:38:43

http://reply.papertrans.cn/88/8711/871031/871031_6.png

disparage 发表于 2025-3-22 19:53:46

Dynamic Analysis,d in this chapter. It is an alternative approach to static analysis that can be used for birthmark construction. Dynamic analysis concerns itself with analysing a running program. The program being run is typically isolated in an environment which allows its behaviour to be inspected. Typical behavi

Mechanics 发表于 2025-3-23 00:22:15

Feature Extraction,tations and birthmarks to be useful. Furthermore, mathematical representations may be embedded in other mathematical types to make birthmarks more amenable to similarity comparisons and for use in classification algorithms. Another approach is to represent features using kernels. This allows for the

occurrence 发表于 2025-3-23 04:27:20

http://reply.papertrans.cn/88/8711/871031/871031_9.png

Introvert 发表于 2025-3-23 08:54:27

Software Similarity Searching and Classification,r class. This chapter examines how we transform the pair-wise similarity problem into a similarity search problem over a database. Moreover, we examine statistical classification of birthmarks to identify the class of software it belongs to.
页: [1] 2 3 4 5
查看完整版本: Titlebook: Software Similarity and Classification; Silvio Cesare,Yang Xiang Book 2012 The Author(s) 2012 Code Clone Detection.Malware Classification.