Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation st...
详细信息
Appropriate dealing with boundary conditions is very important for SPH. Current boundary treatment methods like boundary force method, ghost particle method and virtual boundary layer method, when dealing with complex...
详细信息
By using the knowledge of facial structure and temperature distribution, this paper proposes an automatic eye localization method from infrared thermal images. A facial structure consisting of 15 sub-regions is propos...
详细信息
This paper proposes an approach to generate emotional music using Interactive Genetic Algorithm. Performance rules are described by the KTH rule system. Different emotional expressions can be modeled by using selectio...
详细信息
Attitude, which is the outward manifestation of human psychology information, is inevitable in everyday situation. Attitude recognition by artificial intelligence has become a hotspot and produced promising results in...
详细信息
This paper proposes a novel approach to search for the optimal combination of a measure function and feature weights using an evolutionary algorithm. Different combinations of measure function and feature weights are ...
详细信息
We present a novel method of Object-Oriented test case generation based on UML state diagrams and lab.l Transition System (LTS). The procedure is based on model-based testing techniques with test cases generated from ...
详细信息
In this paper a method for precisely reconstructing porous media three-dimensional model based on slice images is proposed. It first processes the original slice images, then uses 3D seed filling algorithm to find all...
详细信息
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef...
详细信息
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes.
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ...
详细信息
暂无评论