Sciweavers

2740 search results - page 404 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
PEPM
2007
ACM
15 years 9 months ago
Behavioral similarity matching using concrete source code templates in logic queries
Program query languages and pattern-detection techniques are an essential part of program analysis and manipulation systems. Queries and patterns permit the identification of the...
Coen De Roover, Theo D'Hondt, Johan Brichau, Carlo...
PLDI
2010
ACM
15 years 8 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...
BMCBI
2006
138views more  BMCBI 2006»
15 years 3 months ago
Determination of strongly overlapping signaling activity from microarray data
Background: As numerous diseases involve errors in signal transduction, modern therapeutics often target proteins involved in cellular signaling. Interpretation of the activity of...
Ghislain Bidaut, Karsten Suhre, Jean-Michel Claver...
166
Voted
BMCBI
2005
117views more  BMCBI 2005»
15 years 3 months ago
Differentiation of regions with atypical oligonucleotide composition in bacterial genomes
Background: Complete sequencing of bacterial genomes has become a common technique of present day microbiology. Thereafter, data mining in the complete sequence is an essential st...
Oleg N. Reva, Burkhard Tümmler
162
Voted
CCS
2011
ACM
14 years 3 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...