Sciweavers

898 search results - page 110 / 180
» The Certification of Software Tools with respect to Software...
Sort
View
DIMVA
2011
14 years 3 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
OPODIS
2004
15 years 1 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
89
Voted
BMCBI
2008
124views more  BMCBI 2008»
14 years 12 months ago
RPPAML/RIMS: A metadata format and an information management system for reverse phase protein arrays
Background: Reverse Phase Protein Arrays (RPPA) are convenient assay platforms to investigate the presence of biomarkers in tissue lysates. As with other high-throughput technolog...
Romesh Stanislaus, Mark Carey, Helena F. Deus, Kev...
VMCAI
2009
Springer
15 years 6 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu
SIGSOFT
2004
ACM
15 years 5 months ago
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite e...
Jürgen Dingel, Hongzhi Liang