Sciweavers

1687 search results - page 56 / 338
» Which pointer analysis should I use
Sort
View
ESOP
2001
Springer
15 years 8 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
128
Voted
BMCBI
2010
105views more  BMCBI 2010»
15 years 3 months ago
Evaluation of fecal mRNA reproducibility via a marginal transformed mixture modeling approach
Background: Developing and evaluating new technology that enables researchers to recover gene-expression levels of colonic cells from fecal samples could be key to a non-invasive ...
Nysia I. George, Joanne R. Lupton, Nancy D. Turner...
134
Voted
LREC
2010
169views Education» more  LREC 2010»
15 years 5 months ago
Identification of the Question Focus: Combining Syntactic Analysis and Ontology-based Lookup through the User Interaction
Most question-answering systems contain a classifier module which determines a question category, based on which each question is assigned an answer type. However, setting up synt...
Danica Damljanovic, Milan Agatonovic, Hamish Cunni...
118
Voted
JOT
2007
102views more  JOT 2007»
15 years 3 months ago
Type Access Analysis: Towards Informed Interface Design
Programs designed from scratch often start with just a set of classes. Classes can be instantiated and so deliver the objects that are the carriers of information and function. In...
Friedrich Steimann, Philip Mayer
126
Voted
BMCBI
2010
102views more  BMCBI 2010»
15 years 3 months ago
Quantized correlation coefficient for measuring reproducibility of ChIP-chip data
Background: Chromatin immunoprecipitation followed by microarray hybridization (ChIP-chip) is used to study protein-DNA interactions and histone modifications on a genome-scale. T...
Shouyong Peng, Mitzi I. Kuroda, Peter J. Park