Sciweavers

1489 search results - page 69 / 298
» The First Bug Report
Sort
View
BCS
2008
15 years 5 months ago
Hardware Dependability in the Presence of Soft Errors
Using formal verification for designing hardware designs free from logic design bugs has been an active area of research since the last 15 years. Technology has matured and we hav...
Ashish Darbari, Bashir M. Al-Hashimi
BMCBI
2008
105views more  BMCBI 2008»
15 years 4 months ago
A Bayesian method for calculating real-time quantitative PCR calibration curves using absolute plasmid DNA standards
Background: In real-time quantitative PCR studies using absolute plasmid DNA standards, a calibration curve is developed to estimate an unknown DNA concentration. However, potenti...
Mano Sivaganesan, Shawn Seifring, Manju Varma, Ric...
ESEM
2010
ACM
15 years 2 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ASPLOS
2012
ACM
13 years 11 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
ISSTA
2012
ACM
13 years 6 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue