Sciweavers

4895 search results - page 903 / 979
» Tools for Grammar Engineering
Sort
View
ICST
2009
IEEE
15 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
ICFEM
2009
Springer
15 years 4 months ago
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support
Fault-tolerant (FT) distributed protocols (such as group membership, consensus, etc.) represent fundamental building blocks for many practical systems, e.g., the Google File System...
Péter Bokor, Marco Serafini, Neeraj Suri, H...
ICSM
2008
IEEE
15 years 4 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
CGO
2007
IEEE
15 years 4 months ago
Ubiquitous Memory Introspection
Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to atta...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
15 years 4 months ago
Ontology Driven CPG Authoring and Execution via a Semantic Web Framework
Clinical Practice Guidelines (CPG) are used by healthcare practitioners to standardize clinical practice and to provide evidence mediated health-care. Currently, there have been c...
Sajjad Hussain, Syed Sibte Raza Abidi