Sciweavers

206 search results - page 31 / 42
» Predicting Effectiveness of Automatic Testing Tools
Sort
View
DEXA
2003
Springer
147views Database» more  DEXA 2003»
15 years 3 months ago
Context-Aware Data Mining Framework for Wireless Medical Application
Abstract. Data mining, which aims at extracting interesting information from large collections of data, has been widely used as an effective decision making tool. Mining the datas...
Pravin Vajirkar, Sachin Singh, Yugyung Lee
ASPLOS
2012
ACM
13 years 5 months ago
Data races vs. data race bugs: telling the difference with portend
Even though most data races are harmless, the harmful ones are at the heart of some of the worst concurrency bugs. Alas, spotting just the harmful data races in programs is like ï...
Baris Kasikci, Cristian Zamfir, George Candea
BMCBI
2007
94views more  BMCBI 2007»
14 years 9 months ago
A structural analysis of in vitro catalytic activities of hammerhead ribozymes
Background: Ribozymes are small catalytic RNAs that possess the dual functions of sequencespecific RNA recognition and site-specific cleavage. Trans-cleaving ribozymes can inhibit...
Yu Shao, Susan Wu, Chi Yu Chan, Jessie R. Klapper,...
W4A
2006
ACM
15 years 3 months ago
Transforming web pages to become standard-compliant through reverse engineering
Developing Web pages following established standards can make the information more accessible, their rendering more efficient, and their processing by computer applications easier...
Benfeng Chen, Vincent Y. Shen
ISSTA
2012
ACM
13 years 7 days ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...