Sciweavers

16070 search results - page 124 / 3214
» Identifying
Sort
View
144
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
GCB
1998
Springer
78views Biometrics» more  GCB 1998»
15 years 8 months ago
Computational approaches to identify Leucine Zippers
The leucine zipper is a dimerization domain occurring mostly in regulatory and thus in many oncogenic proteins. The leucine repeat in the sequence has been traditionally used for ...
Erich Bornberg-Bauer
155
Voted
IWPC
1997
IEEE
15 years 8 months ago
Identifying objects in legacy systems
Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development has to be weighed aga...
Aniello Cimitile, Andrea De Lucia, Giuseppe A. Di ...
KDD
1997
ACM
117views Data Mining» more  KDD 1997»
15 years 8 months ago
Bayesian Inference for Identifying Solar Active Regions
Michael J. Turmon, Saleem Mukhtar, Judit Pap
PEPM
1994
ACM
15 years 8 months ago
Identifying Profitable Specialization in Object-Oriented Languages
The performance of object-oriented languages can be greatly improved if methods can be specialized for particular classes of arguments. Such specialization can provide the compile...
Jeffrey Dean, Craig Chambers, David Grove