Sciweavers

3500 search results - page 480 / 700
» Implementing Java on Clusters
Sort
View
120
Voted
TEC
2002
166views more  TEC 2002»
15 years 1 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
93
Voted
NAR
2007
111views more  NAR 2007»
15 years 1 months ago
PEDANT genome database: 10 years online
The PEDANT genome database provides exhaustive annotation of 468 genomes by a broad set of bioinformatics algorithms. We describe recent developments of the PEDANT Web server. The...
M. Louise Riley, Thorsten Schmidt, Irena I. Artamo...
RIA
2007
123views more  RIA 2007»
15 years 1 months ago
Continuations pour la programmation de comportement d'agent
Continuations are a well established programming concept that allows capturing and resuming the current program state. They can be found in several functional programming languages...
Denis Jouvin
120
Voted
ICST
2010
IEEE
15 years 21 days ago
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes
—Although many static-analysis techniques have been developed for automatically detecting bugs, such as null dereferences, fewer automated approaches have been presented for anal...
Mijung Kim, Saurabh Sinha, Carsten Görg, Hina...
KBSE
2010
IEEE
15 years 19 days ago
A visual interactive debugger based on symbolic execution
We present the concepts, usage, and prototypic implementation of a new kind of visual debugging tool based on symbolic execution of Java source code called visual symbolic state d...
Reiner Hähnle, Marcus Baum, Richard Bubel, Ma...