Sciweavers

20 search results - page 3 / 4
» Reformulating Table Constraints using Functional Dependencie...
Sort
View
CCS
2010
ACM
13 years 5 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
BMCBI
2006
102views more  BMCBI 2006»
13 years 5 months ago
UVPAR: fast detection of functional shifts in duplicate genes
Background: The imprint of natural selection on gene sequences is often difficult to detect. A plethora of methods have been devised to detect genetic changes due to selective pro...
Vicente Arnau, Miguel Gallach, J. Ignasi Lucas, Ig...
AI
2000
Springer
13 years 5 months ago
Model-based reasoning about learner behaviour
Automated handling of tutoring and training functions in educational systems requires the availability of articulate domain models. In this article we further develop the applicat...
Kees de Koning, Bert Bredeweg, Joost Breuker, Bob ...
PLDI
1997
ACM
13 years 9 months ago
Componential Set-Based Analysis
Set-based analysis is a constraint-based whole program analysis that is applicable to functional and objectoriented programming languages. Unfortunately, the analysis is useless f...
Cormac Flanagan, Matthias Felleisen
CASES
2005
ACM
13 years 7 months ago
Exploring the design space of LUT-based transparent accelerators
Instruction set customization accelerates the performance of applications by compressing the length of critical dependence paths and reducing the demands on processor resources. W...
Sami Yehia, Nathan Clark, Scott A. Mahlke, Kriszti...