Sciweavers

219 search results - page 42 / 44
» Assume-Guarantee Model Checking of Software: A Comparative C...
Sort
View
81
Voted
SIGSOFT
2010
ACM
14 years 7 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
USS
2008
14 years 12 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
GCB
2008
Springer
103views Biometrics» more  GCB 2008»
14 years 10 months ago
Utilizing Promoter Pair Orientations for HMM-based Analysis of ChIP-chip Data
: Array-based analysis of chromatin immunoprecipitation data (ChIP-chip) is a powerful technique for identifying DNA target regions of individual transcription factors. Here, we pr...
Michael Seifert, Jens Keilwagen, Marc Strickert, I...
ICIW
2008
IEEE
15 years 4 months ago
Evaluating the Use of AOP and MDA in Web Service Development
— Model-Driven Architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other...
Guadalupe Ortiz, Behzad Bordbar, Juan Herná...
CODES
2008
IEEE
15 years 4 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...