Sciweavers

578 search results - page 98 / 116
» Analysis of Programs with Exception-Handling Constructs
Sort
View
BMCBI
2007
173views more  BMCBI 2007»
15 years 16 days ago
Ringo - an R/Bioconductor package for analyzing ChIP-chip readouts
Background: Chromatin immunoprecipitation combined with DNA microarrays (ChIP-chip) is a high-throughput assay for DNA-protein-binding or post-translational chromatin/histone modi...
Joern Toedling, Oleg Sklyar, Tammo Krueger, Jenny ...
108
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
233
Voted
POPL
2001
ACM
16 years 22 days ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
104
Voted
CCS
2007
ACM
15 years 6 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
89
Voted
ICSM
2005
IEEE
15 years 6 months ago
Context-Free Slicing of UML Class Models
In the work presented here, we introduce a method to automatically generate a subset of a UML class model based on a user-defined criterion. The goal of this work is to allow us to...
Huzefa H. Kagdi, Jonathan I. Maletic, Andrew Sutto...