The Improvement of GK-tail Algorithm of Software Behavior Modeling
暂无分享,去创建一个
[1] Geoffrey Zweig,et al. From captions to visual concepts and back , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Eleni Stroulia,et al. Mining system-user interaction traces for use case models , 2002, Proceedings 10th International Workshop on Program Comprehension.
[3] Jun Ai,et al. Software Network Models Based on Dynamic Execution for Fault Propagation Research , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security - Companion.
[4] MengChu Zhou,et al. Modeling and Validating E-Commerce Business Process Based on Petri Nets , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[5] Leonardo Mariani,et al. GK-Tail+ An Efficient Approach to Learn Software Models , 2017, IEEE Transactions on Software Engineering.
[6] Zhou Min. Research on Combat Command Intelligence Activities and Information Model Based on IDEF3 , 2014 .
[7] Davar Pishva,et al. A TOR-based anonymous communication approach to secure smart home appliances , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).
[8] Steven Drager,et al. Cyber-physical specification mismatch identification with dynamic analysis , 2015, ICCPS.
[9] V. L. Stefanyuk. The behavior of a finite-state automaton in a fuzzy environment: Theory and applications , 2015, Scientific and Technical Information Processing.
[10] Horst Lichter,et al. A framework for model recommenders requirements, architecture and tool support , 2014, 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD).
[11] Mila Dalla Preda,et al. Infections as Abstract Symbolic Finite Automata: Formal Model and Applications , 2015, 2015 IEEE/ACM 1st International Workshop on Software Protection.
[12] Nikolai Kosmatov,et al. Frama-C - A Software Analysis Perspective , 2012, SEFM.
[13] Todd R. Andel,et al. Comparing the effectiveness of commercial obfuscators against MATE attacks , 2016, SSPREW '16.
[14] Luigi Ciminiera,et al. Modeling Complex Packet Filters With Finite State Automata , 2015, IEEE/ACM Transactions on Networking.