Milos Cvetanovic

Learn More
Context: Detection of an unauthorized use of a software library is a clone detection problem that in case of commercial products has additional complexity due to the fact that only binary code is available. Objective: The goal of this paper is to propose an approach for estimating the level of similarity between the procedures originating from different(More)
— Information extraction from large amount of data is the problem addressed in this paper. Efficient usage of data mining models and algorithms will be presented using the recent IPSI research as a case study. A novel algorithm based on the K-nearest neighbor model has been developed. The algorithm is general enough to be considered as a common solution for(More)
This paper presents an optimization algorithm for transactional memory with lazy conflict detection. The proposed optimization attempts to minimize the execution time of restarted transactions. Minimizing happens during restart, by avoiding the re-execution of a section of a transaction that is unaffected by the restart. The proposed optimization builds on(More)
  • 1