Sciweavers

439 search results - page 17 / 88
» Identification of Software Instabilities
Sort
View
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 8 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw
ICASSP
2009
IEEE
13 years 11 months ago
Tampering identification using Empirical Frequency Response
With the widespread popularity of digital images and the presence of easy-to-use image editing software, content integrity can no longer be taken for granted, and there is a stron...
Wei-Hong Chuang, Ashwin Swaminathan, Min Wu
MKWI
2008
168views Business» more  MKWI 2008»
13 years 9 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
BMCBI
2010
151views more  BMCBI 2010»
13 years 7 months ago
TF-finder: A software package for identifying transcription factors involved in biological processes using microarray data and e
Background: Identification of transcription factors (TFs) involved in a biological process is the first step towards a better understanding of the underlying regulatory mechanisms...
Xiaoqi Cui, Tong Wang, Huann-Sheng Chen, Victor Bu...
ICML
2006
IEEE
14 years 8 months ago
Statistical debugging: simultaneous identification of multiple bugs
We describe a statistical approach to software debugging in the presence of multiple bugs. Due to sparse sampling issues and complex interaction between program predicates, many g...
Alice X. Zheng, Michael I. Jordan, Ben Liblit, May...