Pepe Vila - Cache and Syphilis [rooted2019]RootedCON
?
The document discusses cache latencies and coherence, microarchitectural attacks like Rowhammer and cache attacks, and memory deduplication vulnerabilities like Meltdown. It then provides more details on Rowhammer, describing how bit flips can be induced in memory through repeated activation of aggressor rows, and how this can be exploited. It explains the structure of a DIMM and concepts like bank, row, and row buffer. Tools for finding eviction sets on real hardware are also summarized.
0 to 31337 Real Quick: Lessons Learned by Reversing the Flare-On ChallengeBlaine Stancill
?
Malware reverse engineering challenges are a great way to keep reversing skills sharp and learn new techniques. The Flare-On Challenge is one of the most difficult and respected ones out there. Participants must complete ten unique challenges of increasing sophistication over a six-week period. Only 17 people in the US successfully completed this year's challenge, including the two of us. In this presentation, we'll familiarize reversers and non-reversers alike with how to approach challenge problems, and arm them with tools and tricks to successfully solve the types of problems they regularly see. These techniques not only helped solve this year's Flare-On problems, but more importantly, have real-world applicability. Many of the tools and techniques needed to complete the Flare-On challenge are key to understanding and reversing actual sophisticated malware, such as those used by APTs. We'll walk through how we solved several of the most relevant and creative challenges, providing the audience unique reversing insights that can help both experienced reversers and non-reversers augment their skill sets.
its a good type of ppt for understanding cloning and its types. It also enlists the idea of procedure in the lab to initiate initial division of embryo by electric current.
Animal cloning is the process of producing a genetically identical organism by taking a single cell from the donor animal and using it to reproduce an identical individual. Scamper the horse was a champion barrel racer who won 10 consecutive world championships between 1984-1993. After retiring from competition, Scamper was cloned by an animal genetics corporation, producing a foal named Clayton born in 2006 that is genetically identical but cannot be registered with the American Quarter Horse Association due to cloning.
This document provides information about animal cloning, including its history, processes, examples of cloned animals, and ethical issues. It discusses the three main types of cloning - reproductive cloning, gene cloning, and therapeutic cloning. Reproductive cloning aims to produce genetically identical copies of animals and was used to create Dolly the sheep in 1996, the first mammal cloned from an adult somatic cell. While cloning may help protect endangered species and improve livestock, it also raises ethical concerns about technical safety, personal identity, and the commercialization of life.
Application Profiling at the HPCAC High Performance Centerinside-BigData.com
?
Pak Lui from the HPC Advisory Council presented this deck at the 2017 Stanford HPC Conference.
"To achieve good scalability performance on the HPC scientific applications typically involves good understanding of the workload though performing profile analysis, and comparing behaviors of using different hardware which pinpoint bottlenecks in different areas of the HPC cluster. In this session, a selection of HPC applications will be shown to demonstrate various methods of profiling and analysis to determine the bottleneck, and the effectiveness of the tuning to improve on the application performance from tests conducted at the HPC Advisory Council High Performance Center."
Watch the video presentation: http://wp.me/p3RLHQ-gpY
Learn more: http://hpcadvisorycouncil.com
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Profiling your Applications using the Linux Perf ToolsemBO_Conference
?
This document provides an overview of using the Linux perf tools to profile applications. It discusses setting up perf, benchmarking applications, profiling both CPU usage and sleep times, and analyzing profiling data. The document covers perf commands like perf record to collect profiling data, perf report to analyze the data, and perf script to convert it to other formats. It also discusses profiling options like call graphs and collecting kernel vs. user mode events.
Device-specific Clang Tooling for Embedded SystemsemBO_Conference
?
This document discusses using Clang tooling to refactor raw memory accesses in embedded C code to be type-safe and readable. It involves parsing a CMSIS SVD file to get the device memory map, writing AST matchers to find raw memory accesses, and generating fix-its to refactor the accesses. The tool is implemented as a Clang-tidy check for static analysis and refactoring at compile-time. Challenges include handling cases where register offsets cannot be evaluated statically and designing the tools to work with existing code patterns.
Los proyectos de Big Data han pasado de sus fases de POC, donde la seguridad ha sido, en el mejor de los casos, un aspecto secundario. Por ello las herramientas Big Data y m¨¢s concretamente las usadas para procesar datos, deben ponerse al d¨ªa en seguridad.
Las herramientas como Spark, no est¨¢n pensados para la seguridad. Por eso Abel y Jorge quieren compartir los hacks que han sido necesarios hacer a Spark para poder usar Kerberos para autenticarse contra servicios securizados.
El documento describe el Inventario de Personalidad MMPI-A, una adaptaci¨®n del MMPI original para su uso en adolescentes. El MMPI-A mantiene la estructura del MMPI original pero actualiza el contenido de los ¨ªtems y las normas. Incluye nuevas escalas para evaluar la validez de las respuestas y problemas t¨ªpicos de la adolescencia. El MMPI-A consta de 478 ¨ªtems y puede administrarse a adolescentes de 14 a 18 a?os para evaluar su personalidad de manera multifac¨¦tica.
Una tienda de dise?o llamada Fiusha Color Misk ofrece descuentos exclusivos en sus productos de dise?o, incluyendo un dise?o exclusivo por $650, $30 de descuento y env¨ªo gratis para clientes distinguidos, y promete m¨¢s descuentos en diciembre. La tienda desea a su cliente un buen d¨ªa.
El bullying o acoso escolar se define como cualquier forma de maltrato psicol¨®gico, verbal o f¨ªsico entre estudiantes de forma repetida que expone a la v¨ªctima f¨ªsica y emocionalmente y genera secuelas psicol¨®gicas. El acoso escolar intimida, reduce y somete emocional e intelectualmente a la v¨ªctima con el objetivo de obtener resultados favorables para los acosadores o satisfacer su necesidad de dominar a los dem¨¢s. Los ni?os que acosan buscan la atenci¨®n y reconocimiento que les falta y aprenden un modelo de
Este documento presenta un resumen de los conceptos clave de la mercadotecnia. Explica que la mercadotecnia implica actividades humanas dirigidas a satisfacer necesidades a trav¨¦s del intercambio. Hist¨®ricamente, el intercambio de bienes y servicios se llevaba a cabo a trav¨¦s de varias v¨ªas como la mar¨ªtima. Hoy en d¨ªa, los pa¨ªses que no aplican estrategias de mercadotecnia no progresan tanto como aquellos que s¨ª las aplican. Los pa¨ªses con pocos recursos enfrentan desaf¨ªos particulares en
Este documento describe las memorias de traducci¨®n y compara dos sistemas de memorias de traducci¨®n populares: SDL Trados y D¨¦j¨¤ Vu. Explica c¨®mo se crean las memorias de traducci¨®n, sus componentes y ventajas. Tambi¨¦n compara caracter¨ªsticas clave de ambos sistemas como el n¨²mero de memorias y bases de datos por proyecto, procesamiento de formatos y precio.
Los ni?os de Villar de Olalla visitaron varios museos e iglesias hist¨®ricas en Toledo, incluyendo el museo de El Greco, el museo de Santa Cruz y el hospital de Tavera. Durante la visita, los ni?os completaron una misi¨®n para encontrar un cuadro en particular que mostraba a Cristo crucificado. Despu¨¦s de ver otras obras de arte, bajaron las escaleras mec¨¢nicas y regresaron a su pueblo despu¨¦s de comer.
Los romanos construyeron una extensa red de calzadas y puentes para facilitar la comunicaci¨®n y el transporte a trav¨¦s de su vasto imperio. Esto incluy¨® puentes permanentes para cruzar r¨ªos y monta?as, as¨ª como acueductos y alcantarillados para abastecer de agua y eliminar desechos de las grandes ciudades. La ingenier¨ªa romana permiti¨® el desarrollo de infraestructuras que unificaron su territorio y soportaron el crecimiento urbano.
El documento define la amistad como un afecto rec¨ªproco entre dos personas que no pertenecen a la misma familia, basado en la confianza, la honestidad y la capacidad de aceptar los defectos y cualidades del otro. Explica que la amistad implica preocuparse por el bienestar del amigo, respetarlo tal como es, ser sincero y generoso de forma natural, y aceptar los fallos y limitaciones del otro.
The document discusses CRAM, a compressed binary format for storing sequence alignment data. It provides an overview of common bioinformatics file formats like FASTQ and SAM/BAM, and describes how CRAM internally organizes and compresses different data series like sequences, names, qualities, and auxiliary fields using techniques like block codecs, bit-based codecs, and reference-based encoding. Results are presented comparing the compression ratio and speed of CRAM to other tools on real datasets with and without auxiliary data. Future directions discussed include supporting different sequencing technologies, custom codecs, and lossy compression of quality values.
Internship - Final Presentation (26-08-2015)Sean Krail
?
The document describes a C++ task graph generator that takes C++ code with OpenMP directives as input, parses it using Clang's AST into a data structure representing the task graph, and then outputs the task graph in various formats. The key parts of the task graph are call tasks for function calls and parallel regions, statement group tasks for non-parallel statements, and parallel tasks for parallel statements. The task graph data structure is then converted to TGFF, DOT and DARTS formats, with DARTS code generated to execute the task graph and validate correct dependencies and ordering.
The document summarizes Mark Wong's presentation on using PostgreSQL with Android applications. It provides an overview and code samples for connecting to a PostgreSQL database from an Android application using the PostgreSQL JDBC driver. It also covers topics like executing queries, listening for notifications, and using prepared statements. The slides are available online and questions from the audience are welcomed.
Los proyectos de Big Data han pasado de sus fases de POC, donde la seguridad ha sido, en el mejor de los casos, un aspecto secundario. Por ello las herramientas Big Data y m¨¢s concretamente las usadas para procesar datos, deben ponerse al d¨ªa en seguridad.
Las herramientas como Spark, no est¨¢n pensados para la seguridad. Por eso Abel y Jorge quieren compartir los hacks que han sido necesarios hacer a Spark para poder usar Kerberos para autenticarse contra servicios securizados.
El documento describe el Inventario de Personalidad MMPI-A, una adaptaci¨®n del MMPI original para su uso en adolescentes. El MMPI-A mantiene la estructura del MMPI original pero actualiza el contenido de los ¨ªtems y las normas. Incluye nuevas escalas para evaluar la validez de las respuestas y problemas t¨ªpicos de la adolescencia. El MMPI-A consta de 478 ¨ªtems y puede administrarse a adolescentes de 14 a 18 a?os para evaluar su personalidad de manera multifac¨¦tica.
Una tienda de dise?o llamada Fiusha Color Misk ofrece descuentos exclusivos en sus productos de dise?o, incluyendo un dise?o exclusivo por $650, $30 de descuento y env¨ªo gratis para clientes distinguidos, y promete m¨¢s descuentos en diciembre. La tienda desea a su cliente un buen d¨ªa.
El bullying o acoso escolar se define como cualquier forma de maltrato psicol¨®gico, verbal o f¨ªsico entre estudiantes de forma repetida que expone a la v¨ªctima f¨ªsica y emocionalmente y genera secuelas psicol¨®gicas. El acoso escolar intimida, reduce y somete emocional e intelectualmente a la v¨ªctima con el objetivo de obtener resultados favorables para los acosadores o satisfacer su necesidad de dominar a los dem¨¢s. Los ni?os que acosan buscan la atenci¨®n y reconocimiento que les falta y aprenden un modelo de
Este documento presenta un resumen de los conceptos clave de la mercadotecnia. Explica que la mercadotecnia implica actividades humanas dirigidas a satisfacer necesidades a trav¨¦s del intercambio. Hist¨®ricamente, el intercambio de bienes y servicios se llevaba a cabo a trav¨¦s de varias v¨ªas como la mar¨ªtima. Hoy en d¨ªa, los pa¨ªses que no aplican estrategias de mercadotecnia no progresan tanto como aquellos que s¨ª las aplican. Los pa¨ªses con pocos recursos enfrentan desaf¨ªos particulares en
Este documento describe las memorias de traducci¨®n y compara dos sistemas de memorias de traducci¨®n populares: SDL Trados y D¨¦j¨¤ Vu. Explica c¨®mo se crean las memorias de traducci¨®n, sus componentes y ventajas. Tambi¨¦n compara caracter¨ªsticas clave de ambos sistemas como el n¨²mero de memorias y bases de datos por proyecto, procesamiento de formatos y precio.
Los ni?os de Villar de Olalla visitaron varios museos e iglesias hist¨®ricas en Toledo, incluyendo el museo de El Greco, el museo de Santa Cruz y el hospital de Tavera. Durante la visita, los ni?os completaron una misi¨®n para encontrar un cuadro en particular que mostraba a Cristo crucificado. Despu¨¦s de ver otras obras de arte, bajaron las escaleras mec¨¢nicas y regresaron a su pueblo despu¨¦s de comer.
Los romanos construyeron una extensa red de calzadas y puentes para facilitar la comunicaci¨®n y el transporte a trav¨¦s de su vasto imperio. Esto incluy¨® puentes permanentes para cruzar r¨ªos y monta?as, as¨ª como acueductos y alcantarillados para abastecer de agua y eliminar desechos de las grandes ciudades. La ingenier¨ªa romana permiti¨® el desarrollo de infraestructuras que unificaron su territorio y soportaron el crecimiento urbano.
El documento define la amistad como un afecto rec¨ªproco entre dos personas que no pertenecen a la misma familia, basado en la confianza, la honestidad y la capacidad de aceptar los defectos y cualidades del otro. Explica que la amistad implica preocuparse por el bienestar del amigo, respetarlo tal como es, ser sincero y generoso de forma natural, y aceptar los fallos y limitaciones del otro.
The document discusses CRAM, a compressed binary format for storing sequence alignment data. It provides an overview of common bioinformatics file formats like FASTQ and SAM/BAM, and describes how CRAM internally organizes and compresses different data series like sequences, names, qualities, and auxiliary fields using techniques like block codecs, bit-based codecs, and reference-based encoding. Results are presented comparing the compression ratio and speed of CRAM to other tools on real datasets with and without auxiliary data. Future directions discussed include supporting different sequencing technologies, custom codecs, and lossy compression of quality values.
Internship - Final Presentation (26-08-2015)Sean Krail
?
The document describes a C++ task graph generator that takes C++ code with OpenMP directives as input, parses it using Clang's AST into a data structure representing the task graph, and then outputs the task graph in various formats. The key parts of the task graph are call tasks for function calls and parallel regions, statement group tasks for non-parallel statements, and parallel tasks for parallel statements. The task graph data structure is then converted to TGFF, DOT and DARTS formats, with DARTS code generated to execute the task graph and validate correct dependencies and ordering.
The document summarizes Mark Wong's presentation on using PostgreSQL with Android applications. It provides an overview and code samples for connecting to a PostgreSQL database from an Android application using the PostgreSQL JDBC driver. It also covers topics like executing queries, listening for notifications, and using prepared statements. The slides are available online and questions from the audience are welcomed.
No dark magic - Byte code engineering in the real worldtcurdt
?
The document discusses how Java bytecode is executed on a Java Virtual Machine (JVM) and compares the steps of compiling and running a "Hello World" Java program across different platforms and tools. It also summarizes several bytecode manipulation libraries and frameworks and provides examples of how they can be used for tasks like analysis, modification, and runtime weaving of aspects.
This document discusses XDP (eXpress Data Path), a high-performance network data path that allows programs to run on the receive path of a network interface card. XDP enables packet processing using eBPF programs before packets reach the Linux networking stack. The document provides an overview of XDP and its performance advantages over other packet processing methods. It also discusses XDP's current status and support in the Linux kernel as well as example use cases and benchmarks.
High Performance Systems Without Tears - Scala Days Berlin 2018Zahari Dichev
?
The document discusses techniques for improving performance in Scala applications by reducing object allocation and improving data locality. It describes how excessive object instantiation can hurt performance by increasing garbage collection work and introducing non-determinism. Extractor objects are presented as a tool for pattern matching that can improve brevity and expressiveness. Name-based extractors introduced in Scala 2.11 avoid object allocation. The talk also covers how caching hierarchies work to reduce memory access latency and the importance of data access patterns for effective cache utilization. Cache-oblivious algorithms are designed to optimize memory hierarchy usage without knowing cache details. Synchronization is noted to have performance costs as well in an example event log implementation.
The document discusses different implementations of shared pointers in C++ and proposes an adaptive approach. It summarizes three common implementations of shared pointers: invasive, slim, and fat. It then proposes a "linked small pointer" implementation that is optimized for small object counts by using a linked list instead of a reference count. For larger object counts, it would transition to a traditional reference counted implementation. Finally, it proposes an "adaptive linked pointer" that uses unused bits in pointers to track reference counts for smaller objects and dynamically transitions between the linked and reference counted approaches. Benchmark results show this adaptive approach has performance comparable to traditional implementations.
This document discusses building a machine learning model to detect potential cyberattack types using network connection data from the KDD Cup 1999 dataset. The objective is to classify connection data into normal and attack types. The document compares various data preprocessing techniques like feature selection, encoding, and scaling that will be used to preprocess the data before training a deep learning model for classification. Feature selection methods include chi-squared test, random forest, and extra trees classifiers. Encoding methods include one-hot, binary, frequency, and label encoding. Scaling methods include min-max, standardization, binarizing, and normalizing. An autoencoder will further process the preprocessed data to extract optimal features for classification using a deep neural network.
This document provides information on various debugging and profiling tools that can be used for Ruby including:
- lsof to list open files for a process
- strace to trace system calls and signals
- tcpdump to dump network traffic
- google perftools profiler for CPU profiling
- pprof to analyze profiling data
It also discusses how some of these tools have helped identify specific performance issues with Ruby like excessive calls to sigprocmask and memcpy calls slowing down EventMachine with threads.
Neuroscience core lecture given at the Icahn school of medicine at Mount Sinai. This is the version 2 of the same topic. I have made some modifications to give a more gentle introduction and add a new example for ngs.plot.
Convolutional neural networks for image classification ¡ª evidence from Kaggle...Dmytro Mishkin
?
This document discusses convolutional neural networks for image classification and their application to the Kaggle National Data Science Bowl competition. It provides an overview of CNNs and their effectiveness for computer vision tasks. It then details various CNN architectures, preprocessing techniques, and ensembling methods that were tested on the competition dataset, achieving a top score of 0.609 log loss. The document concludes with highlights of the winning team's solution, including novel pooling methods and knowledge distillation.
R can be used for a wide range of tasks including:
- Summarizing, R can integrate with C/C++, Fortran, Java and other languages and APIs like OpenGL, MPI, and web services.
- Binding different languages together, R objects can be passed between R and other languages like C/C++ using .C() and Fortran using .Fortran().
- Parallel programming, packages like foreach and doMC/doMPI/doSNOW allow parallel execution on multicore CPUs or computer clusters using MPI.
This presentation slides were used at JJUG (Japan Java User Group) night seminar, which was held in the form of virtual conference on September 28, 2020. This deck is written in Japanese.
CodeQL + DTrace = Memory Disclosure Vulnerabilities in XNUArsenii Kostromin
?
CodeQL + DTrace = in XNU
The document discusses using CodeQL and DTrace to find kernel memory disclosure vulnerabilities in XNU, the kernel for macOS. It describes building a CodeQL database for XNU, writing CodeQL queries to find unsafe array index patterns, and how these patterns could be exploited via the DTrace framework in the kernel to leak kernel memory. One example shows an out-of-bounds read issue in a DTrace function that was addressed by Apple.
Introduction to 3D Printing Technology.pptxpprakash21252
?
Welcome to our presentation on 3D printing technology, where we explore the transformative power of this innovative manufacturing process. Also known as additive manufacturing, 3D printing has been gaining momentum in recent years, and its potential to revolutionize industries is vast.
In this presentation, we delve into the world of 3D printing, discussing its history, principles, and applications. We examine the various types of 3D printing technologies, including Fused Deposition Modeling (FDM), Stereolithography (SLA), and Selective Laser Sintering (SLS). We also explore the advantages and limitations of 3D printing, including its ability to create complex geometries, reduce material waste, and increase product customization.
One of the most significant impacts of 3D printing is its potential to transform industries. We discuss the applications of 3D printing in various sectors, including aerospace, automotive, healthcare, and consumer products. We examine case studies of companies that have successfully implemented 3D printing, such as Boeing, BMW, and Procter & Gamble.
The presentation also explores the future of 3D printing, including emerging trends and technologies. We discuss the potential of 3D printing to disrupt traditional supply chains and create new business models. We also examine the challenges and limitations of 3D printing, including the need for standardization, regulation, and education.
This presentation is ideal for anyone interested in learning about 3D printing technology, including students, researchers, entrepreneurs, and industry professionals. Whether you are looking to gain a basic understanding of 3D printing or seeking to explore its applications in various industries, this presentation is a valuable resource.
NFPA 70B & 70E Changes and Additions Webinar Presented By FlukeTranscat
?
Join us for this webinar about NFPA 70B & 70E changes and additions. NFPA 70B and NFPA 70E are both essential standards from the National Fire Protection Association (NFPA) that focus on electrical safety in the workplace. Both standards are critical for protecting workers, reducing the risk of electrical accidents, and ensuring compliance with safety regulations in industrial and commercial environments.
Fluke Sales Applications Manager Curt Geeting is presenting on this engaging topic:
Curt has worked for Fluke for 24 years. He currently is the Senior Sales Engineer in the NYC & Philadelphia Metro Markets. In total, Curt has worked 40 years in the industry consisting of 14 years in Test Equipment Distribution, 4+ years in Mfg. Representation, NAED Accreditation, Level 1 Thermographer, Level 1 Vibration Specialist, and Power Quality SME.
Virtual Power plants-Cleantech-RevolutionAshoka Saket
?
VPPs are virtual aggregations of distributed energy resources, such as energy storage, solar panels, and wind turbines, that can be controlled and optimized in real-time to provide grid services.
21. Clone set Reasons
Cforig-only
Too small after decomp.
Too diff. after decomp.
Smaller after decomp. higher dissimilarity
Unknown
Cfdecomp-only
Having deleted/added stmt., type cast, package
name.
Different if-else statements
Different loop statements
Inner class methods
Unknown
Characteristics of Disjoint Clones
22. Clone set Reasons
Cforig-only Too small after decomp.
Too diff. after decomp.
Smaller after decomp. higher
dissimilarity
Unknown
Cfdecomp-only
Having deleted/added stmt., type
cast, package name.
Different if-else statements
Different loop statements
Inner class methods
Unknown
JFreeChart
0 10 20 30 40 50
5
11
32
6
9
T1 T2 T3
0 2 4 6 8 10 12 14 16
12
4
3
8
12
53
23. Clone set Reasons
Cforig-only Too small after decomp.
Too diff. after decomp.
Smaller after decomp. higher
dissimilarity
Unknown
Cfdecomp-only
Having deleted/added stmt., type
cast, package name.
Different if-else statements
Different loop statements
Inner class methods
Unknown
Tomcat
0 28 56 84 112 140
16
5
120
19
6
T1 T2 T3
0 5 10 15 20 25 30
20
2
1
3
2
24. @Override
public Range ?ndRangeBounds(XYDataset dataset) {
if (dataset != null) {
Range r = DatasetUtilities.?ndRangeBounds(dataset, false);
if (r == null) {
return null;
} else {
return new Range(r.getLowerBound() + this.yO?set,
r.getUpperBound() + this.blockHeight + this.yO?set);
}
} else {
return null;
}
}
@Override
public Range ?ndDomainBounds(XYDataset dataset) {
if (dataset == null) {
return null;
}
Range r = DatasetUtilities.?ndDomainBounds(dataset, false);
if (r == null) {
return null;
}
return new Range(r.getLowerBound() + this.xO?set,
r.getUpperBound() + this.blockWidth + this.xO?set);
}
O
R
I
G
I
N
A
L
25. @Override
public Range ?ndRangeBounds(XYDataset dataset) {
if (dataset != null) {
Range r = DatasetUtilities.?ndRangeBounds(dataset, false);
if (r == null) {
return null;
} else {
return new Range(r.getLowerBound() + this.yO?set,
r.getUpperBound() + this.blockHeight + this.yO?set);
}
} else {
return null;
}
}
@Override
public Range ?ndDomainBounds(XYDataset dataset) {
if (dataset == null) {
return null;
}
Range r = DatasetUtilities.?ndDomainBounds(dataset, false);
if (r == null) {
return null;
}
return new Range(r.getLowerBound() + this.xO?set,
r.getUpperBound() + this.blockWidth + this.xO?set);
}
O
R
I
G
I
N
A
L
26. @Override
public Range ?ndDomainBounds(?nal XYDataset dataset) {
if (dataset == null) {
return null;
}
?nal Range r = DatasetUtilities.?ndDomainBounds(dataset, false);
if (r == null) {
return null;
}
return new Range(r.getLowerBound() + this.xO?set,
r.getUpperBound() + this.blockWidth + this.xO?set);
}
@Override
public Range ?ndRangeBounds(?nal XYDataset dataset) {
if (dataset == null) {
return null;
}
?nal Range r = DatasetUtilities.?ndRangeBounds(dataset, false);
if (r == null) {
return null;
}
return new Range(r.getLowerBound() + this.yO?set,
r.getUpperBound() + this.blockHeight + this.yO?set);
}
D
E
C
O
M
P
I
L
E
D
30. 26
Study on 3 real-world systems: JUnit, JFreeChart, Tomcat
Using Compilation/Decompilation ?
to Enhance Clone Detection
1 Clone pairs before and after decompilation are mostly
similar for all three clone types.
Findings:
2 One can complement the original clone results by
incorporating clones after decompilation.
Characteristics of disjoint clones3
C. Ragkhitwetsagul, J. Krinke
cragkhit.github.io/crjk-iwsc17