-
1
-
-
85175130249
-
-
Page checked 3/4
-
Code Assurance. http://patterninsight.com/products/code-assurance/. Page checked 3/4/2012.
-
(2012)
Code Assurance
-
-
-
2
-
-
85175132134
-
-
Page checked 3/4
-
Pittsburgh Supercomputing Center. http://www.psc.edu/. Page checked 3/4/2012.
-
(2012)
-
-
-
3
-
-
85175129818
-
-
Page checked 3/4
-
QuickLZ. http://www.quicklz.com/. Page checked 3/4/2012.
-
(2012)
-
-
-
4
-
-
85175134224
-
-
Page checked 3/4
-
SimMetrics. http://sourceforge.net/projects/simmetrics/. Page checked 3/4/2012.
-
(2012)
SimMetrics
-
-
-
6
-
-
85175134507
-
-
Page checked 3/4
-
Daniel Bernstein. http://www.cse.yorku.ca/∼oz/hash.html. Page checked 3/4/2012.
-
(2012)
-
-
Bernstein, D.1
-
7
-
-
75749147262
-
A few billion lines of code later: Using static analysis to find bugs in the real world
-
Al Bessey, Ken Block, Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, and Dawson Engler. A few billion lines of code later: using static analysis to find bugs in the real world. Communications of the Association for Computing Machinery, 53(2):66-75, 2010.
-
(2010)
Communications of the Association for Computing Machinery
, vol.53
, Issue.2
, pp. 66-75
-
-
Al Bessey, K.B.1
Ben Chelf, A.C.2
Fulton, B.3
Hallem, S.4
Henri-Gros, C.5
Kamsky, A.6
McPeak, S.7
Engler, D.8
-
9
-
-
70450232823
-
Network applications of bloom filters: A survey
-
Andrei Broder and Michael Mitzenmacher. Network applications of bloom filters: A survey. Internet Mathematics, 1(4):485-509, 2005.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
11
-
-
48449091474
-
A polynomial nominal unification algorithm
-
Christophe Calvès and Maribel Fernández. A polynomial nominal unification algorithm. Theoretical Computer Science, 403:285-306, 2008.
-
(2008)
Theoretical Computer Science
, vol.403
, pp. 285-306
-
-
Calvès, C.1
Fernández, M.2
-
13
-
-
59449108823
-
-
CVE-2008-0928. Page checked 3/4
-
National Vulnerability Database. CVE-2008-0928. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2008-0928. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
14
-
-
59449108823
-
-
CVE-2009-3720. Page checked 3/4
-
National Vulnerability Database. CVE-2009-3720. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2009-3720. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
15
-
-
59449108823
-
-
CVE-2010-0405. Page checked 3/4
-
National Vulnerability Database. CVE-2010-0405. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2010-0405. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
16
-
-
59449108823
-
-
CVE-2011-1092. Page checked 3/4
-
National Vulnerability Database. CVE-2011-1092. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-1092. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
17
-
-
59449108823
-
-
CVE-2011-1782. Page checked 3/4
-
National Vulnerability Database. CVE-2011-1782. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-1782. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
18
-
-
59449108823
-
-
CVE-2011-3200. Page checked 3/4
-
National Vulnerability Database. CVE-2011-3200. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-3200. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
19
-
-
59449108823
-
-
CVE-2011-3368. Page checked 3/4
-
National Vulnerability Database. CVE-2011-3368. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-3368. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
20
-
-
59449108823
-
-
CVE-2011-3872. Page checked 3/4
-
National Vulnerability Database. CVE-2011-3872. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-3872. Page checked 3/4/2012.
-
(2012)
National Vulnerability Database
-
-
-
21
-
-
78650078104
-
Scalable and systematic detection of buggy inconsistencies in source code
-
Mark Gabel, Junfeng Yang, Yuan Yu, Moises Goldszmidt, and Zhendong Su. Scalable and systematic detection of buggy inconsistencies in source code. In Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, 2010.
-
Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, 2010
-
-
Gabel, M.1
Yang, J.2
Yu, Y.3
Goldszmidt, M.4
Su, Z.5
-
24
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7):654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
25
-
-
33645819206
-
CP-Miner: Finding copy-paste and related bugs in large-scale software code
-
Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou. CP-Miner: finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, 32:176-192, 2006.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
27
-
-
85175133125
-
-
CVE-2011-3145. Page checked 3/4
-
Ubuntu Security Notice. CVE-2011-3145. http://www.ubuntu.com/usn/usn- 1196-1/. Page checked 3/4/2012.
-
(2012)
Ubuntu Security Notice
-
-
-
29
-
-
73549107233
-
Hash kernels for structured data
-
Qinfeng Shi, James Petterson, Gideon Dror, John Langford, Alex Smola, and S.V.N. Vishwanathan. Hash kernels for structured data. Journal of Machine Learning Research, 10:2615-2637, 2009.
-
(2009)
Journal of Machine Learning Research
, vol.10
, pp. 2615-2637
-
-
Shi, Q.1
Petterson, J.2
Dror, G.3
Langford, J.4
Smola, A.5
Vishwanathan, S.V.N.6
|