Sciweavers

1186 search results - page 223 / 238
» On Designing an Experiment to Evaluate a Reverse Engineering...
Sort
View
BMCBI
2006
122views more  BMCBI 2006»
13 years 9 months ago
PET-Tool: a software suite for comprehensive processing and managing of Paired-End diTag (PET) sequence data
Background: We recently developed the Paired End diTag (PET) strategy for efficient characterization of mammalian transcriptomes and genomes. The paired end nature of short PET se...
Kuo Ping Chiu, Chee-Hong Wong, Qiongyu Chen, Prami...
IUI
2009
ACM
14 years 5 months ago
Trailblazer: enabling blind users to blaze trails through the web
For blind web users, completing tasks on the web can be frustrating. Each step can require a time-consuming linear search of the current web page to find the needed interactive e...
Jeffrey P. Bigham, Tessa A. Lau, Jeffrey Nichols
ICST
2009
IEEE
14 years 3 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
ROMAN
2007
IEEE
175views Robotics» more  ROMAN 2007»
14 years 3 months ago
BuildBot: Robotic Monitoring of Agile Software Development Teams
Abstract - In this paper, we describe BuildBot, a robotic interface developed to assist with the continuous integration process utilized by agile software development teams. BuildB...
Ruth Ablett, Ehud Sharlin, Frank Maurer, Jörg...
CGO
2006
IEEE
14 years 3 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...