Sciweavers

143 search results - page 20 / 29
» Data-Flow Analysis of Program Fragments
Sort
View
ENTCS
2002
134views more  ENTCS 2002»
13 years 9 months ago
Implementing Compositional Analysis Using Intersection Types With Expansion Variables
A program analysis is compositional when the analysis result for a particular program fragment is obtained solely from the results for its immediate subfragments via some composit...
Assaf J. Kfoury, Geoffrey Washburn, Joe Wells
BMCBI
2010
145views more  BMCBI 2010»
13 years 9 months ago
WaveletQuant, an improved quantification software based on wavelet signal threshold de-noising for labeled quantitative proteomi
Background: Quantitative proteomics technologies have been developed to comprehensively identify and quantify proteins in two or more complex samples. Quantitative proteomics base...
Fan Mo, Qun Mo, Yuanyuan Chen, David R. Goodlett, ...
IRI
2006
IEEE
14 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
DOCENG
2009
ACM
14 years 4 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
QEST
2007
IEEE
14 years 3 months ago
Automated Analysis of Simulation Traces - Separating Progress from Repetitive Behavior
Among the many stages of a simulation study, debugging a simulation model is the one that is hardly reported on but that may consume a considerable amount of time and effort. In t...
Peter Kemper, Carsten Tepper