Sciweavers

981 search results - page 125 / 197
» Semantics-aware trace analysis
Sort
View
RV
2010
Springer
153views Hardware» more  RV 2010»
15 years 1 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
RE
2010
Springer
14 years 10 months ago
From Requirements Documents to System Models: A Tool for Interactive Semi-Automatic Translation
Natural language is the main presentation means in industrial requirements documents. This leads to the fact that requirements documents are often incomplete and inconsistent. Desp...
Leonid Kof
BMCBI
2011
14 years 6 months ago
NeurphologyJ: an automatic neuronal morphology quantification method and its application in pharmacological discovery
Background: Automatic quantification of neuronal morphology from images of fluorescence microscopy plays an increasingly important role in high-content screenings. However, there ...
Shinn-Ying Ho, Chih-Yuan Chao, Hui-Ling Huang, Tza...
ASPLOS
2006
ACM
15 years 9 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
MSR
2010
ACM
15 years 8 months ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...