Sciweavers

159 search results - page 25 / 32
» Detecting Missing Method Calls in Object-Oriented Software
Sort
View
KBSE
2009
IEEE
14 years 2 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
PEPM
2010
ACM
14 years 4 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
BMCBI
2008
124views more  BMCBI 2008»
13 years 7 months ago
Alignment of protein structures in the presence of domain motions
Background: Structural alignment is an important step in protein comparison. Well-established methods exist for solving this problem under the assumption that the structures under...
Roberto Mosca, Barbara Brannetti, Thomas R. Schnei...
BMCBI
2011
12 years 11 months ago
Reconstructing genome-wide regulatory network of E. coli using transcriptome data and predicted transcription factor activities
Background: Gene regulatory networks play essential roles in living organisms to control growth, keep internal metabolism running and respond to external environmental changes. Un...
Yao Fu, Laura R. Jarboe, Julie A. Dickerson
TAPSOFT
1995
Springer
13 years 11 months ago
Anatomy of the Pentium Bug
The Pentium computer chip’s division algorithm relies on a table from which five entries were inadvertently omitted, with the result that 1738 single precision dividenddivisor ...
Vaughan R. Pratt