scispace - formally typeset
Search or ask a question
Topic

Software

About: Software is a research topic. Over the lifetime, 130577 publications have been published within this topic receiving 2028987 citations. The topic is also known as: computer software & computational tool.


Papers
More filters
Journal ArticleDOI
TL;DR: The idea is to identify security-critical software bugs so they can be fixed first rather than waiting for them to be fixed later.
Abstract: A system and method for automatically generating exploits, such as exploits for target code, is described. In some implementations, the system received binary code and/or source code of a software applications, finds one or more exploitable bugs within the software application, and automatically generates exploits for the exploitable bugs.

270 citations

Book
01 Jan 1987
TL;DR: This applied, self-contained text provides detailed coverage of the practical aspects of multivariate statistical process control (MVSPC) based on the application of Hotelling's T2 statistic.
Abstract: This applied, self-contained text provides detailed coverage of the practical aspects of multivariate statistical process control (MVSPC) based on the application of Hotelling's T2 statistic. MVSPC is the application of multivariate statistical techniques to improve the quality and productivity of an industrial process. The authors, leading researchers in this area who have developed major software for this type of charting procedure, provide valuable insight into the T2 statistic. Intentionally including only a minimal amount of theory, they lead readers through the construction and monitoring phases of the T2 control statistic using numerous industrial examples taken primarily from the chemical and power industries. These examples are applied to the construction of historical data sets to serve as a point of reference for the control procedure and are also applied to the monitoring phase, where emphasis is placed on signal location and interpretation in terms of the process variables. Specifically devoted to the T2 methodology, Multivariate Statistical Process Control with Industrial Applications is the only book available that concisely and thoroughly presents such topics as how to construct a historical data set; how to check the necessary assumptions used with this procedure; how to chart the T2 statistic; how to interpret its signals; how to use the chart in the presence of autocorrelated data; and how to apply the procedure to batch processes. The book comes with a CD-ROM containing a 90-day demonstration version of the QualStat multivariate SPC software specifically designed for the application of T2 control procedures. The CD-ROM is compatible with Windows 95, Windows 98, Windows Me Millennium Edition, and Windows NT operating systems.

269 citations

Book
24 Jul 2009
TL;DR: Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization to give thorough, scholarly coverage of an area of growing importance in computer security.
Abstract: This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a must have for every researcher, student, and practicing professional in software protection Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse EngineeringThe last decade has seen significant progress in the development of techniques for resisting software piracy and tampering These techniques are indispensable for software developers seeking to protect vital intellectual property Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incurChristian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques Coverage includesMastering techniques that both attackers and defenders use to analyze programsUsing code obfuscation to make software harder to analyze and understandFingerprinting software to identify its author and to trace software pirates Tamperproofing software using guards that detect and respond to illegal modifications of code and dataStrengthening content protection through dynamic watermarking and dynamic obfuscation Detecting code theft via software similarity analysis and birthmarking algorithmsUsing hardware techniques to defend software and media against piracy and tampering Detecting software tampering in distributed systemUnderstanding the theoretical limits of code obfuscation

269 citations

Journal ArticleDOI
TL;DR: The software, called GMTSAR, is an open-source (GNU General Public License) InSAR processing system designed for users familiar with Generic Mapping Tools and requires installation of GMT and Network Common Data Format and supports several fast Fourier transform libraries.
Abstract: [1] Over the past 15 years, software for processing interferometric synthetic aperture radar (InSAR) data into maps of surface deformation has been developed and refined. The InSAR technique is commonly used to investigate deformation associated with earthquakes, volcanoes, withdrawal of crustal fluids, and coherent ice motions [Massonnet and Feigl, 1998]. The software, called Generic Mapping Tools Synthetic Aperture Radar (GMTSAR), is an open-source (GNU General Public License) InSAR processing system designed for users familiar with Generic Mapping Tools (GMT) [Wessel and Smith, 1998]. The GMTSAR code is written in the C programing language and will run on any UNIX® computer. It requires installation of GMT and Network Common Data Format (NetCDF) and supports several fast Fourier transform libraries.

269 citations

Proceedings ArticleDOI
Xin Ye1, Hui Shen1, Xiao Ma1, Razvan Bunescu1, Chang Liu1 
14 May 2016
TL;DR: This paper proposes bridging the lexical gap by projecting natural language statements and code snippets as meaning vectors in a shared representation space and shows that the learned vector space embeddings lead to improvements in a previously explored bug localization task and a newly introduced task of linking API documents to computer programming questions.
Abstract: The application of information retrieval techniques to search tasks in software engineering is made difficult by the lexical gap between search queries, usually expressed in natural language (eg English), and retrieved documents, usually expressed in code (eg programming languages) This is often the case in bug and feature location, community question answering, or more generally the communication between technical personnel and non-technical stake holders in a software project In this paper, we propose bridging the lexical gap by projecting natural language statements and code snippets as meaning vectors in a shared representation space In the proposed architecture, word embeddings are first trained on API documents, tutorials, and reference documents, and then aggregated in order to estimate semantic similarities between documents Empirical evaluations show that the learned vector space embeddings lead to improvements in a previously explored bug localization task and a newly defined task of linking API documents to computer programming questions

269 citations


Network Information
Related Topics (5)
User interface
85.4K papers, 1.7M citations
87% related
Cluster analysis
146.5K papers, 2.9M citations
86% related
Support vector machine
73.6K papers, 1.7M citations
86% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20246
20235,523
202213,625
20213,455
20205,268
20195,982