Sciweavers

102 search results - page 17 / 21
» Software Engineering Research Strategy: Combining Experiment...
Sort
View
CGO
2006
IEEE
14 years 2 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
GEOINFORMATICA
2008
123views more  GEOINFORMATICA 2008»
13 years 8 months ago
Efficient Implementation Techniques for Topological Predicates on Complex Spatial Objects
Topological relationships like overlap, inside, meet, and disjoint uniquely characterize the relative position between objects in space. For a long time, they have been a focus of...
Reasey Praing, Markus Schneider
FPGA
2008
ACM
136views FPGA» more  FPGA 2008»
13 years 10 months ago
A complexity-effective architecture for accelerating full-system multiprocessor simulations using FPGAs
Functional full-system simulators are powerful and versatile research tools for accelerating architectural exploration and advanced software development. Their main shortcoming is...
Eric S. Chung, Eriko Nurvitadhi, James C. Hoe, Bab...
TCBB
2010
91views more  TCBB 2010»
13 years 3 months ago
SCS: Signal, Context, and Structure Features for Genome-Wide Human Promoter Recognition
This paper integrates the signal, context and structure features for genome-wide promoter recognition, which is critical in many DNA sequence analysis tasks. First, CpG islands ar...
Jia Zeng, Xiaoyu Zhao, Xiao-Qin Cao, Hong Yan
PROMISE
2010
13 years 3 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...