Sciweavers

6318 search results - page 1255 / 1264
» Data Leakage Detection
Sort
View
TOG
2002
128views more  TOG 2002»
14 years 9 months ago
Modelling with implicit surfaces that interpolate
We introduce new techniques for modelling with interpolating implicit surfaces. This form of implicit surface was first used for problems of surface reconstruction [24] and shape ...
Greg Turk, James F. O'Brien
TSE
2002
157views more  TSE 2002»
14 years 9 months ago
Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
Lionel C. Briand, Walcélio L. Melo, Jü...
BMCBI
2010
81views more  BMCBI 2010»
14 years 9 months ago
Empirical Bayes Analysis of Sequencing-based Transcriptional Profiling without Replicates
Background: Recent technological advancements have made high throughput sequencing an increasingly popular approach for transcriptome analysis. Advantages of sequencing-based tran...
Zhijin Wu, Bethany D. Jenkins, Tatiana A. Rynearso...
COMCOM
2008
135views more  COMCOM 2008»
14 years 9 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
SAC
2008
ACM
14 years 9 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
« Prev « First page 1255 / 1264 Last » Next »