Sciweavers

1687 search results - page 61 / 338
» Which pointer analysis should I use
Sort
View
140
Voted
ECOOP
2005
Springer
15 years 9 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
127
Voted
DOCENG
2005
ACM
15 years 5 months ago
Encapsulating and manipulating component object graphics (COGs) using SVG
Scalable Vector Graphics (SVG) has an imaging model similar to that of PostScript and PDF but the XML basis of SVG allows it to participate fully, via namespaces, in generalised X...
Alexander J. Macdonald, David F. Brailsford, Steve...
115
Voted
BMCBI
2006
78views more  BMCBI 2006»
15 years 3 months ago
Subfamily logos: visualization of sequence deviations at alignment positions with high information content
Background: Recognition of relevant sequence deviations can be valuable for elucidating functional differences between protein subfamilies. Interesting residues at highly conserve...
Eric Beitz
132
Voted
CORR
2000
Springer
144views Education» more  CORR 2000»
15 years 3 months ago
Sequence-Based Abstract Interpretation of Prolog
-BASED ABSTRACT INTERPRETATION OF PROLOG1 BAUDOUIN LE CHARLIER, SABINA ROSSI, AND PASCAL VAN HENTENRYCK . Abstract interpretation is a general methodology for systematic developmen...
Baudouin Le Charlier, Sabina Rossi, Pascal Van Hen...
129
Voted
IV
2007
IEEE
144views Visualization» more  IV 2007»
15 years 10 months ago
Evaluating an InfoVis Technique Using Insight Reports
The evaluation of Information Visualization (InfoVis) techniques can help to identify specific strengths and weaknesses of these methods. The following article describes the resu...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...