Sciweavers

289 search results - page 45 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
BMCBI
2007
105views more  BMCBI 2007»
15 years 1 months ago
HoxPred: automated classification of Hox proteins using combinations of generalised profiles
Background: Correct identification of individual Hox proteins is an essential basis for their study in diverse research fields. Common methods to classify Hox proteins focus on th...
Morgane Thomas-Chollier, Luc Leyns, Valérie...
ISSTA
2006
ACM
15 years 7 months ago
An empirical study of the robustness of MacOS applications using random testing
We report on the fourth in a series of studies on the reliability of application programs in the face of random input. Over the previous 15 years, we have studied the reliability ...
Barton P. Miller, Gregory Cooksey, Fredrick Moore
DIMVA
2006
15 years 3 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
102
Voted
SIGMETRICS
1992
ACM
128views Hardware» more  SIGMETRICS 1992»
15 years 5 months ago
MemSpy: Analyzing Memory System Bottlenecks in Programs
To cope with the increasing difference between processor and main memory speeds, modern computer systems use deep memory hierarchies. In the presence of such hierarchies, the perf...
Margaret Martonosi, Anoop Gupta, Thomas E. Anderso...
DSN
2008
IEEE
15 years 8 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...