Sciweavers

398 search results - page 41 / 80
» On the Inference of Configuration Structures from Source Cod...
Sort
View
MSR
2006
ACM
15 years 8 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
203
Voted
ENTCS
2002
166views more  ENTCS 2002»
15 years 2 months ago
Translation and Run-Time Validation of Optimized Code
The paper presents approaches to the validation of optimizing compilers. The emphasis is on aggressive and architecture-targeted optimizations which try to obtain the highest perf...
Lenore D. Zuck, Amir Pnueli, Yi Fang, Benjamin Gol...
BMCBI
2005
114views more  BMCBI 2005»
15 years 2 months ago
Systematic analysis of human kinase genes: a large number of genes and alternative splicing events result in functional and stru
Background: Protein kinases are a well defined family of proteins, characterized by the presence of a common kinase catalytic domain and playing a significant role in many importa...
Luciano Milanesi, Mauro Petrillo, Leandra Sepe, An...
133
Voted
BMCBI
2008
140views more  BMCBI 2008»
15 years 2 months ago
Improved accuracy of multiple ncRNA alignment by incorporating structural information into a MAFFT-based framework
Background: Structural alignment of RNAs is becoming important, since the discovery of functional non-coding RNAs (ncRNAs). Recent studies, mainly based on various approximations ...
Kazutaka Katoh, Hiroyuki Toh
113
Voted
IJISEC
2006
106views more  IJISEC 2006»
15 years 2 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis