Sciweavers

2957 search results - page 44 / 592
» Code analysis and CS-XML
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
IDA
2008
Springer
13 years 7 months ago
ExpertDiscovery system application for the hierarchical analysis of eukaryotic transcription regulatory regions based on DNA cod
We developed Relational Data Mining approach which allows to overcome essential limitations of the Data Mining and Knowledge Discovery techniques. In the paper the approach was im...
I. V. Khomicheva, Eugenii E. Vityaev, Elena A. Ana...
ICIP
2003
IEEE
14 years 9 months ago
A 2D representation for analysis and coding of power quality events
In this work, we demonstrate examples about uses of practical image processing techniques over a new interpretation of power quality event data. Power quality event data are 1D da...
Ömer Nezih Gerek, Dogãn Gökhan Ec...
TACAS
2010
Springer
210views Algorithms» more  TACAS 2010»
14 years 2 months ago
Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors
Modern multicore processors, such as the Cell Broadband Engine, achieve high performance by equipping accelerator cores with small “scratchpad” memories. The price for increase...
Alastair F. Donaldson, Daniel Kroening, Philipp R&...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Automated substring hole analysis
Code coverage is a common measure for quantitatively assessing the quality of software testing. Code coverage indicates the fraction of code that is actually executed by tests in ...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...