Sciweavers

242 search results - page 30 / 49
» Measuring Similarity of Large Software Systems Based on Sour...
Sort
View
ISSTA
2012
ACM
11 years 11 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
BMCBI
2004
156views more  BMCBI 2004»
13 years 8 months ago
GeneXplorer: an interactive web application for microarray data visualization and analysis
Background: When publishing large-scale microarray datasets, it is of great value to create supplemental websites where either the full data, or selected subsets corresponding to ...
Christian A. Rees, Janos Demeter, John C. Matese, ...
CASSIS
2004
Springer
14 years 14 days ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
APCCM
2008
13 years 10 months ago
A Practical Guide to Testing the Understandability of Notations
Model-driven development is the process of creating models of a software system and transforming them into source code. Since the stepwise transformations can be done automaticall...
Susanne Patig
PROMISE
2010
13 years 3 months ago
Better, faster, and cheaper: what is better software?
Background: Defects are related to failures and they do not have much power for indicating a higher quality or a better system above the baseline that the end-users expect. Nevert...
Burak Turhan, Çetin Meriçli, Tekin M...