Sciweavers

205 search results - page 27 / 41
» Test Case Prioritization Based on Analysis of Program Struct...
Sort
View
ALMOB
2006
155views more  ALMOB 2006»
14 years 10 months ago
A phylogenetic generalized hidden Markov model for predicting alternatively spliced exons
Background: An important challenge in eukaryotic gene prediction is accurate identification of alternatively spliced exons. Functional transcripts can go undetected in gene expres...
Jonathan E. Allen, Steven L. Salzberg
ICLP
2009
Springer
15 years 5 months ago
An Engine for Computing Well-Founded Models
The seemingly simple choice of whether to use call variance or call subsumption in a tabled evaluation deeply affects an evaluation’s properties. Most tabling implementations hav...
Terrance Swift
ICPPW
2002
IEEE
15 years 3 months ago
A Statistical Approach for the Analysis of the Relation Between Low-Level Performance Information, the Code, and the Environment
This paper presents a methodology for aiding a scientific programmer to evaluate the performance of parallel programs on advanced architectures. It applies well-defined design o...
Nayda G. Santiago, Diane T. Rover, Domingo Rodr&ia...
85
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 4 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
HYBRID
2009
Springer
15 years 2 months ago
Trajectory Based Verification Using Local Finite-Time Invariance
Abstract. In this paper we propose a trajectory based reachability analysis by using local finite-time invariance property. Trajectory based analysis are based on the execution tra...
A. Agung Julius, George J. Pappas