Sciweavers

324 search results - page 31 / 65
» Detecting common elements of types
Sort
View
SCAM
2002
IEEE
14 years 14 days ago
Handling Preprocessor-Conditioned Declarations
Many software systems are developed with configurable functionality, and for multiple hardware platforms and operating systems. This can lead to thousands of possible configuratio...
Lerina Aversano, Massimiliano Di Penta, Ira D. Bax...
CSFW
2011
IEEE
12 years 7 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
ATAL
2004
Springer
14 years 29 days ago
Universality in Multi-Agent Systems
Much research in multi-agent systems reflects the field’s origins in classical artificial intelligence, showing how various refinements to the internal reasoning of individual a...
H. Van Dyke Parunak, Sven Brueckner, Robert Savit
BMCBI
2007
99views more  BMCBI 2007»
13 years 7 months ago
RepSeq - A database of amino acid repeats present in lower eukaryotic pathogens
Background: Amino acid repeat-containing proteins have a broad range of functions and their identification is of relevance to many experimental biologists. In human-infective prot...
Daniel P. Depledge, Ryan P. J. Lower, Deborah F. S...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Do Maintainers Utilize Deployed Design Patterns Effectively?
One claimed benefit of deploying design patterns is facilitating maintainers to perform anticipated changes. However, it is not at all obvious that the relevant design patterns de...
T. H. Ng, S. C. Cheung, W. K. Chan, Y. T. Yu