Sciweavers

75 search results - page 6 / 15
» Keynote Address: .QL for Source Code Analysis
Sort
View
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
14 years 1 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 7 months ago
High-SNR Analysis of Outage-Limited Communications with Bursty and Delay-Limited Information
Abstract-- This work analyzes the high-SNR asymptotic error performance of outage-limited communications with fading, where the number of bits that arrive at the transmitter during...
Somsak Kittipiyakul, Petros Elia, Tara Javidi
INFOCOM
2007
IEEE
14 years 1 months ago
Optimization Based Rate Control for Multicast with Network Coding
— Recent advances in network coding have shown great potential for efficient information multicasting in communication networks, in terms of both network throughput and network ...
Lijun Chen, Tracey Ho, Steven H. Low, Mung Chiang,...
BMCBI
2010
133views more  BMCBI 2010»
13 years 4 months ago
Initial steps towards a production platform for DNA sequence analysis on the grid
Background: Bioinformatics is confronted with a new data explosion due to the availability of high throughput DNA sequencers. Data storage and analysis becomes a problem on local ...
Angela C. M. Luyf, Barbera D. C. van Schaik, Miche...
CSMR
1999
IEEE
13 years 11 months ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella