Sciweavers

950 search results - page 152 / 190
» Free and Open Source Software
Sort
View
COMPSAC
2008
IEEE
15 years 4 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
KBSE
2007
IEEE
15 years 4 months ago
Keyword programming in java
Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of keywords provided by t...
Greg Little, Robert C. Miller
FASE
2006
Springer
15 years 1 months ago
Relation of Code Clones and Change Couplings
Abstract. Code clones have long been recognized as bad smells in software systems and are considered to cause maintenance problems during evolution. It is broadly assumed that the ...
Reto Geiger, Beat Fluri, Harald Gall, Martin Pinzg...
LREC
2010
256views Education» more  LREC 2010»
14 years 11 months ago
WAPUSK20 - A Database for Robust Audiovisual Speech Recognition
Audiovisual speech recognition (AVSR) systems have been proven superior over audio-only speech recognizers in noisy environments by incorporating features of the visual modality. ...
Alexander Vorwerk, Xiaohui Wang, Dorothea Kolossa,...
SCFBM
2008
119views more  SCFBM 2008»
14 years 9 months ago
Boolean network simulations for life scientists
Modern life sciences research increasingly relies on computational solutions, from large scale data analyses to theoretical modeling. Within the theoretical models Boolean network...
István Albert, Juilee Thakar, Song Li, Ranr...