Track topics on Twitter Track topics that are important to you
As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the software quality and its attack-defending ability. Most analysis and evaluation on important entities like codes-based static structure analysis are on the destruction of the actual software running. In this paper, from the perspective of software execution process, we proposed an approach to mine dynamic noteworthy functions (DNFM)in software execution sequences. First, according to software decompiling and tracking stack changes, the execution traces composed of a series of function addresses were acquired. Then these traces were modeled as execution sequences and then simplified so as to get simplified sequences (SFS), followed by the extraction of patterns through pattern extraction (PE) algorithm from SFS. After that, evaluating indicators inner-importance and inter-importance were designed to measure the noteworthiness of functions in DNFM algorithm. Finally, these functions were sorted by their noteworthiness. Comparison and contrast were conducted on the experiment results from two traditional complex network-based node mining methods, namely PageRank and DegreeRank. The results show that the DNFM method can mine noteworthy functions in software effectively and precisely.
This article was published in the following journal.
Name: PloS one
With the avalanche of biological sequences in public databases, one of the most challenging problems in computational biology is to predict their biological functions and cellular attributes. Most of ...
High-utility sequential pattern mining (HUSPM) has become an important issue in the field of data mining. Several HUSPM algorithms have been designed to mine high-utility sequential patterns (HUPSPs)....
The execution of a script often requires detecting and resolving conflict with a goal, particularly in nonroutine situations. To take the example of taking a bus daily to work, if someone's usual bus ...
In this paper, we present a research work on a novel methodology of identifying abnormal behaviors at the underlying network monitor layer during runtime based on the execution patterns of Web of Thin...
The objective of this evaluation is to understand the human health impacts of mountaintop removal (MTR) mining, the major method of coal mining in and around Central Appalachia. MTR mining impacts the...
The purpose of this study is to evaluate new computer software on breast magnetic resonance imaging (MRI). The information from this study may help doctors and scientists develop better wa...
The dynamic angio-MR sequences with injection of contrast (CE ARM) allow the study of the vascular anatomy. These sequences, widely used in clinical routine have shown their utility, in pa...
In previous studies exploring specific sequences of MRI (susceptibility weighted imaging (SWI) and arterial spin labeling (ASL)), the investigators have shown the great sensibility of thes...
We tried to use data mining method to find out the new model of factors that affects the progression of diabetes mellitus.
The aim of this study is evaluate a software developed for alternative communication designed for people with speech difficulties. The software was executed by 30 volunteers using mobile d...
The act of testing the software for compliance with a standard.
Specifications and instructions applied to the software.
Software capable of recognizing dictation and transcribing the spoken words into written text.
Text editing and storage functions using computer software.
Computer programs or software installed on mobile electronic devices which support a wide range of functions and uses which include television, telephone, video, music, word processing, and Internet service.