Academic literature on the topic 'Function calls sequence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Function calls sequence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Function calls sequence"
Wang, Rongcun, Rubing Huang, Yansheng Lu, and Binbin Qu. "Clustering Analysis of Function Call Sequence for Regression Test Case Reduction." International Journal of Software Engineering and Knowledge Engineering 24, no. 08 (October 2014): 1197–223. http://dx.doi.org/10.1142/s0218194014500387.
Full textFleury, Cécile, Jérôme Gracy, Marie-Françoise Gautier, Jean-Luc Pons, Jean-François Dufayard, Gilles Labesse, Manuel Ruiz, and Frédéric de Lamotte. "Comprehensive classification of the plant non-specific lipid transfer protein superfamily towards its sequence–structure–function analysis." PeerJ 7 (August 14, 2019): e7504. http://dx.doi.org/10.7717/peerj.7504.
Full textZhang, Bing, Chun Shan, Munawar Hussain, Jiadong Ren, and Guoyan Huang. "Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns." International Journal of Software Engineering and Knowledge Engineering 30, no. 05 (May 2020): 695–719. http://dx.doi.org/10.1142/s0218194020500254.
Full textSievert, Volker, Sylvia Kuhn, Achim Paululat, and Walther Traut. "Sequence conservation and expression of the Sex-lethal homologue in the fly Megaselia scalaris." Genome 43, no. 2 (March 15, 2000): 382–90. http://dx.doi.org/10.1139/g99-132.
Full textHansen, Per Krogh. "Tiden ødelægger alt. Om episodisk bagvendte fortællinger illustreret ved hjælp af Gaspar Noés Irréversible." K&K - Kultur og Klasse 39, no. 112 (December 25, 2011): 93–106. http://dx.doi.org/10.7146/kok.v39i112.15746.
Full textNissen, P. E., J. Christensen-Dalsgaard, J. R. Mosumgaard, V. Silva Aguirre, E. Spitoni, and K. Verma. "High-precision abundances of elements in solar-type stars." Astronomy & Astrophysics 640 (August 2020): A81. http://dx.doi.org/10.1051/0004-6361/202038300.
Full textNie, Dan, and Yu Hui Wang. "Taint Graph of System Call Arguments for Intrusion Detection in Mobile Intelatrac." Advanced Materials Research 546-547 (July 2012): 1101–6. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1101.
Full textChen, Hui, Zhengqiang Li, Qingshan Jiang, Abdur Rasool, and Lifei Chen. "A Hierarchical Approach for Android Malware Detection Using Authorization-Sensitive Features." Electronics 10, no. 4 (February 10, 2021): 432. http://dx.doi.org/10.3390/electronics10040432.
Full textHan, Yongman, Jongcheon Choi, Seong-Je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, and Minkyu Park. "A new detection scheme of software copyright infringement using software birthmark on windows systems." Computer Science and Information Systems 11, no. 3 (2014): 1055–69. http://dx.doi.org/10.2298/csis130918064h.
Full textYelensky, Roman, Kai Wang, Snjezana Dogan, Laetitia Borsu, Garrett Frampton, Doron Lipson, Philip Stephens, et al. "Next-generation sequencing of FFPE solid tumor specimens for clinical use." Journal of Clinical Oncology 30, no. 15_suppl (May 20, 2012): 10524. http://dx.doi.org/10.1200/jco.2012.30.15_suppl.10524.
Full textDissertations / Theses on the topic "Function calls sequence"
Harmim, Dominik. "Pokročilá statická analýza atomičnosti v paralelních programech v prostředí Facebook Infer." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445592.
Full textTseng, Chun-han, and 曾俊翰. "Intrusion Detection Using Function-based Sequences of System Calls." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/9u5t6d.
Full text國立中央大學
資訊工程研究所
96
Computer and network security problems cause billions in damage every year. As the use of Internet, modern computer systems are plagued from security vulnerabilities. Security issues have become more and more important in such environment. Although the concept of buffer overflows had been known for years, modern computer systems suffered from these kinds of security weaknesses constantly. This article presents an improved method for intrusion detection, which detect abnormal behaviors of a process using function-based sequences of system calls. The method is especially effective in detecting Buffer Overflow Attacks. Our method also stored these sequences through a data structure called Suffix Tree, which improved our system performance a lot. Experiments show that our method has better effectiveness and performance than previous methods.
Books on the topic "Function calls sequence"
Milstein, Sara J. Making a Case. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190911805.001.0001.
Full textBook chapters on the topic "Function calls sequence"
Ariola, Zena M., Paul Downen, Hugo Herbelin, Keiko Nakata, and Alexis Saurin. "Classical Call-by-Need Sequent Calculi: The Unity of Semantic Artifacts." In Functional and Logic Programming, 32–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29822-6_6.
Full textCui, Zhanqi, Xiang Chen, Yongmin Mu, Zhihua Zhang, and Xu Ma. "Mining Function Call Sequence Patterns Across Different Versions of the Project for Defect Detection." In Software Analysis, Testing, and Evolution, 154–69. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04272-1_10.
Full textBailey, Timothy L. "MEME, MAST, and Meta-MEME: New Tools for Motif Discovery in Protein Sequences." In Pattern Discovery in Biomolecular Data. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780195119404.003.0008.
Full textBauer, Thomas, and Robert Eschbach. "Model-Based Testing of Distributed Functions." In Advanced Automated Software Testing, 151–81. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0089-8.ch008.
Full textSmullyan, Raymond M. "Indexing." In Recursion Theory for Metamathematics. Oxford University Press, 1993. http://dx.doi.org/10.1093/oso/9780195082326.003.0007.
Full textO’Leary, Jared. "Coding “Hip Hot Cross Buns” with Sonic Pi (Beginner)." In The Music Technology Cookbook, 301–10. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197523889.003.0050.
Full textPatel, Bhaskar N., and S. G. Prajapati. "Performance Comparison of AODV and DSDV Routing Protocols of MANET." In Technological Advancements and Applications in Mobile Ad-Hoc Networks, 144–51. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0321-9.ch008.
Full textSánchez-Pozos, Katy, María de los Ángeles Granados-Silvestre, and María Guadalupe Ortíz-López. "From Pharmacogenetics to Gene Expression: Implications for Precision Medicine in Diabetes." In Drug Metabolism [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.97375.
Full textGaines, Susan M., Geoffrey Eglinton, and Jürgen Rullkötter. "Molecular Paleontology and Biochemical Evolution." In Echoes of Life. Oxford University Press, 2008. http://dx.doi.org/10.1093/oso/9780195176193.003.0015.
Full textConference papers on the topic "Function calls sequence"
Gorji, Alireza, and Mahdi Abadi. "Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls." In the 2014 ACM Southeast Regional Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2638404.2737181.
Full textKawasoe, Reo, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, and Jun'ichi Takeuchi. "Investigating behavioral differences between IoT malware via function call sequence graphs." In SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3412841.3442041.
Full textDitu, Bogdan. "Model-Based Function Call Code Generation and Stack Management in Retargetable Compilers: Application Binary Interface Modeling of Stack Layout and Function Call Sequence." In 2015 20th International Conference on Control Systems and Computer Science (CSCS). IEEE, 2015. http://dx.doi.org/10.1109/cscs.2015.38.
Full textKim, Myoung Yee, and Yoonsik Cheon. "A Fitness Function to Find Feasible Sequences of Method Calls for Evolutionary Testing of Object-Oriented Programs." In 2008 International Conference on Software Testing, Verification, and Validation. IEEE, 2008. http://dx.doi.org/10.1109/icst.2008.31.
Full textWang, Nanxin, and Jie Cheng. "EMAT: An Engineering Methodology Application Tool." In ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium collocated with the ASME 1995 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/cie1995-0730.
Full textCipollone, Roberto, Davide Di Battista, and Angelo Gualtieri. "Energy Recovery From the Turbocharging System of Internal Combustion Engines." In ASME 2012 11th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/esda2012-82302.
Full text