Sciweavers

534 search results - page 38 / 107
» Sensitivity Analysis of Markovian Models
Sort
View
CCS
2003
ACM
14 years 2 months ago
Buffer overrun detection using linear programming and static analysis
This paper addresses the issue of identifying buffer overrun vulnerabilities by statically analyzing C source code. We demonstrate a light-weight analysis based on modeling C stri...
Vinod Ganapathy, Somesh Jha, David Chandler, David...
ICASSP
2011
IEEE
13 years 25 days ago
A fully automated 2-DE gel image analysis pipeline for high throughput proteomics
Image analysis is still considered as the bottleneck in 2D-gel based expression proteomics analysis for biomarkers discovery. We are presenting a new end-to-end image analysis pip...
Panagiotis Tsakanikas, Elias S. Manolakos
BMCBI
2006
119views more  BMCBI 2006»
13 years 9 months ago
Evaluation of microarray data normalization procedures using spike-in experiments
Background: Recently, a large number of methods for the analysis of microarray data have been proposed but there are few comparisons of their relative performances. By using so-ca...
Patrik Rydén, Henrik Andersson, Mattias Lan...
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
14 years 25 days ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
ISSTA
2012
ACM
11 years 11 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...