Sciweavers

3056 search results - page 225 / 612
» Open Implementation Analysis and Design
Sort
View
139
Voted
DIMVA
2006
15 years 6 months ago
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Incomplete or improper input validation is one of the major sources of security bugs in programs. While traditional approaches often focus on detecting string related buffer overfl...
Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Kar...
BMCBI
2005
70views more  BMCBI 2005»
15 years 4 months ago
Integrating alternative splicing detection into gene prediction
Background: Alternative splicing (AS) is now considered as a major actor in transcriptome/ proteome diversity and it cannot be neglected in the annotation process of a new genome....
Sylvain Foissac, Thomas Schiex
LPAR
2010
Springer
15 years 2 months ago
Interpolating Quantifier-Free Presburger Arithmetic
Craig interpolation has become a key ingredient in many symbolic model checkers, serving as an approximative replacement for expensive quantifier elimination. In this paper, we foc...
Daniel Kroening, Jérôme Leroux, Phili...
APLAS
2011
ACM
14 years 4 months ago
Soundness of Data Flow Analyses for Weak Memory Models
Modern multi-core microprocessors implement weak memory consistency models; programming for these architectures is a challenge. This paper solves a problem open for ten years, and ...
Jade Alglave, Daniel Kroening, John Lugton, Vincen...
ECRTS
2006
IEEE
15 years 10 months ago
Sensitivity Analysis for Fixed-Priority Real-Time Systems
At early stages in the design of real-time embedded applications, the timing attributes of the computational activities are often incompletely specified or subject to changes. Lat...
Enrico Bini, Marco Di Natale, Giorgio C. Buttazzo