Sciweavers

2957 search results - page 552 / 592
» Code analysis and CS-XML
Sort
View
ISSTA
2010
ACM
14 years 11 months ago
The Google FindBugs fixit
In May 2009, Google conducted a company wide FindBugs “fixit”. Hundreds of engineers reviewed thousands of FindBugs warnings, and fixed or filed reports against many of the...
Nathaniel Ayewah, William Pugh
DOCENG
2010
ACM
14 years 10 months ago
Document imaging security and forensics ecosystem considerations
: Document Imaging Security and Forensics Ecosystem Considerations Steven Simske, Margaret Sturgill, Guy Adams, Paul Everest HP Laboratories HPL-2010-156 Security, Forensics, Colo...
Steven J. Simske, Margaret Sturgill, Guy Adams, Pa...
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SIGCOMM
2010
ACM
14 years 10 months ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
BMCBI
2010
104views more  BMCBI 2010»
14 years 9 months ago
Bidirectional best hit r-window gene clusters
Background: Conserved gene clusters are groups of genes that are located close to one another in the genomes of several species. They tend to code for proteins that have a functio...
Melvin Zhang, Hon Wai Leong