Sciweavers

3667 search results - page 192 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
139
Voted
ACMSE
2006
ACM
15 years 9 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
141
Voted
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
15 years 9 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
125
Voted
BMCBI
2010
124views more  BMCBI 2010»
15 years 3 months ago
GPFrontend and GPGraphics: graphical analysis tools for genetic association studies
Background: Most software packages for whole genome association studies are non-graphical, purely text based programs originally designed to run with UNIX-like operating systems. ...
Steffen Uebe, Francesca Pasutto, Mandy Krumbiegel,...
165
Voted
BMCBI
2008
131views more  BMCBI 2008»
15 years 3 months ago
CoCoNUT: an efficient system for the comparison and analysis of genomes
Background: Comparative genomics is the analysis and comparison of genomes from different species. This area of research is driven by the large number of sequenced genomes and hea...
Mohamed Ibrahim Abouelhoda, Stefan Kurtz, Enno Ohl...
CCS
2009
ACM
15 years 10 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu