Sciweavers

2957 search results - page 552 / 592
» Code analysis and CS-XML
Sort
View
ISSTA
2010
ACM
13 years 10 months ago
The Google FindBugs fixit
In May 2009, Google conducted a company wide FindBugs “fixit”. Hundreds of engineers reviewed thousands of FindBugs warnings, and fixed or filed reports against many of the...
Nathaniel Ayewah, William Pugh
DOCENG
2010
ACM
13 years 9 months ago
Document imaging security and forensics ecosystem considerations
: Document Imaging Security and Forensics Ecosystem Considerations Steven Simske, Margaret Sturgill, Guy Adams, Paul Everest HP Laboratories HPL-2010-156 Security, Forensics, Colo...
Steven J. Simske, Margaret Sturgill, Guy Adams, Pa...
CCS
2010
ACM
13 years 8 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SIGCOMM
2010
ACM
13 years 8 months ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
BMCBI
2010
104views more  BMCBI 2010»
13 years 8 months ago
Bidirectional best hit r-window gene clusters
Background: Conserved gene clusters are groups of genes that are located close to one another in the genomes of several species. They tend to code for proteins that have a functio...
Melvin Zhang, Hon Wai Leong