Sciweavers

160 search results - page 28 / 32
» Strong dependencies between software components
Sort
View
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
TSE
2008
165views more  TSE 2008»
13 years 7 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
14 years 18 days ago
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Karthik Lakshmanan, Gaurav Bhatia, Ragunathan Rajk...
BMCBI
2007
126views more  BMCBI 2007»
13 years 7 months ago
Comparison of gene expression profiles altered by comfrey and riddelliine in rat liver
Background: Comfrey (Symphytum officinale) is a perennial plant and has been consumed by humans as a vegetable, a tea and an herbal medicine for more than 2000 years. It, however,...
Lei Guo, Nan Mei, Stacey L. Dial, James C. Fuscoe,...
SCIE
1997
Springer
13 years 11 months ago
Semantic Matching: Formal Ontological Distinctions for Information Organization, Extraction, and Integration
Abstract. The task of information extraction can be seen as a problem of semantic matching between a user-defined template and a piece of information written in natural language. T...
Nicola Guarino