Sciweavers

606 search results - page 85 / 122
» A Comparative Study of Industrial Static Analysis Tools
Sort
View
WWW
2004
ACM
15 years 11 months ago
Post-processing inkml for random-access navigation of voluminous handwritten ink documents
The goal of this research is the improvement of browsing voluminous InkML data in two areas: ease of rendering continuous inkflow for replay-browsing, and ease of random access na...
Khaireel A. Mohamed, Lioudmila Belenkaia, Thomas O...
56
Voted
ACSAC
2004
IEEE
15 years 2 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
CORR
2006
Springer
91views Education» more  CORR 2006»
14 years 10 months ago
Quasi-friendly sup-interpretations
In a previous paper [16], the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static an...
Jean-Yves Marion, Romain Péchoux
88
Voted
BMCBI
2007
163views more  BMCBI 2007»
14 years 10 months ago
Use of genomic DNA control features and predicted operon structure in microarray data analysis: ArrayLeaRNA - a Bayesian approac
Background: Microarrays are widely used for the study of gene expression; however deciding on whether observed differences in expression are significant remains a challenge. Resul...
Carmen Pin, Mark Reuter
ICCCN
2008
IEEE
15 years 4 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz