Sciweavers

419 search results - page 48 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
ICSM
2002
IEEE
14 years 15 days ago
Architecture Analysis Tools to Support Evolution of Large Industrial Systems
This paper describes an architecture analysis tool-set supporting the evolutionary improvement of the software architecture of an existing medical imaging system. The toolset has ...
Tobias Rötschke, René L. Krikhaar
SOSP
2003
ACM
14 years 4 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
BMCBI
2008
88views more  BMCBI 2008»
13 years 7 months ago
Large-scale identification of polymorphic microsatellites using an in silico approach
Background: Simple Sequence Repeat (SSR) or microsatellite markers are valuable for genetic research. Experimental methods to develop SSR markers are laborious, time consuming and...
Jifeng Tang, Samantha J. Baldwin, Jeanne M. E. Jac...
IJDE
2007
384views more  IJDE 2007»
13 years 7 months ago
Computer Forensic Analysis in a Virtual Environment
In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and softwa...
Derek Bem, Ewa Huebner
QSIC
2007
IEEE
14 years 1 months ago
Learning Effective Oracle Comparator Combinations for Web Applications
Web application testers need automated, effective approaches to validate the test results of complex, evolving web applications. In previous work, we developed a suite of automate...
Sara Sprenkle, Emily Hill, Lori L. Pollock