Sciweavers

787 search results - page 100 / 158
» Source code analysis and manipulation
Sort
View
BMCBI
2011
13 years 4 months ago
PheMaDB: A solution for storage, retrieval, and analysis of high throughput phenotype data
Background: OmniLog™ phenotype microarrays (PMs) have the capability to measure and compare the growth responses of biological samples upon exposure to hundreds of growth condit...
Wenling E. Chang, Keri Sarver, Brandon W. Higgs, T...
SIGSOFT
2003
ACM
14 years 10 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
CASCON
1996
77views Education» more  CASCON 1996»
13 years 11 months ago
Harvesting design for an application framework
Framework design begins with domain analysis. Either the problem domain is analyzed to create a new design, or the solution domain is analyzed to understand how the problem has al...
Joan Boone
ICSE
2008
IEEE-ACM
14 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
IROS
2009
IEEE
195views Robotics» more  IROS 2009»
14 years 4 months ago
System design of an Insertable Robotic Effector Platform for Single Port Access (SPA) Surgery
—This paper presents a novel design and preliminary kinematic analysis of an Insertable Robotic Effector Platform (IREP) for Single Port Access (SPA) Surgery. The IREP robot can ...
Kai Xu 0005, Roger E. Goldman, Jienan Ding, Peter ...