Sciweavers

4257 search results - page 778 / 852
» The Logical Modularity of Programs
Sort
View
131
Voted
ICISS
2010
Springer
15 years 15 days ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
164
Voted
AOSD
2011
ACM
14 years 6 months ago
An aspect-oriented approach for implementing evolutionary computation applications
Object-oriented frameworks support design and code reuse for specific application domains. To facilitate the development of evolutionary computation (EC) programs, such as geneti...
Andres J. Ramirez, Adam C. Jensen, Betty H. C. Che...
ICSE
2007
IEEE-ACM
15 years 8 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
142
Voted
BMCBI
2007
148views more  BMCBI 2007»
15 years 2 months ago
p53FamTaG: a database resource of human p53, p63 and p73 direct target genes combining in silico prediction and microarray data
Background: The p53 gene family consists of the three genes p53, p63 and p73, which have polyhedral non-overlapping functions in pivotal cellular processes such as DNA synthesis a...
Elisabetta Sbisà, Domenico Catalano, Giorgi...
111
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
A study of student strategies for the corrective maintenance of concurrent software
Graduates of computer science degree programs are increasingly being asked to maintain large, multi-threaded software systems; however, the maintenance of such systems is typicall...
Scott D. Fleming, Eileen Kraemer, R. E. Kurt Stire...