Sciweavers

1327 search results - page 209 / 266
» Cost-Benefit Analysis of Software Development Techniques and...
Sort
View
ASWC
2008
Springer
14 years 11 months ago
Semantic Assistants - User-Centric Natural Language Processing Services for Desktop Clients
Today's knowledge workers have to spend a large amount of time and manual effort on creating, analyzing, and modifying textual content. While more advanced semantically-orient...
René Witte, Thomas Gitzinger
CGO
2006
IEEE
15 years 3 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
BMCBI
2011
14 years 4 months ago
A quality metric for homology modeling: the H-factor
Background: The analysis of protein structures provides fundamental insight into most biochemical functions and consequently into the cause and possible treatment of diseases. As ...
Eric di Luccio, Patrice Koehl
GD
2008
Springer
14 years 11 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
EMSOFT
2008
Springer
14 years 11 months ago
Volatiles are miscompiled, and what to do about it
C's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memorysystem level. We tested thirteen product...
Eric Eide, John Regehr