Sciweavers

238 search results - page 34 / 48
» Model Checking DSL-Generated C Source Code
Sort
View
CCS
2008
ACM
13 years 10 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
BMCBI
2010
99views more  BMCBI 2010»
13 years 8 months ago
Prediction of novel precursor miRNAs using a context-sensitive hidden Markov model (CSHMM)
Background: It has been apparent in the last few years that small non coding RNAs (ncRNA) play a very significant role in biological regulation. Among these microRNAs (miRNAs), 22...
Sumeet Agarwal, Candida Vaz, Alok Bhattacharya, As...
ICCS
2003
Springer
14 years 1 months ago
A Compiler Approach to Performance Prediction Using Empirical-Based Modeling
Abstract. Performance understanding and prediction are extremely important goals for guiding the application of program optimizations or in helping programmers focus their efforts...
Pedro C. Diniz
OOPSLA
2010
Springer
13 years 6 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu
ACSAC
2004
IEEE
13 years 11 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...