Sciweavers

12334 search results - page 193 / 2467
» The Use of C
Sort
View
SIGSOFT
2004
ACM
16 years 5 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
BMCBI
2006
107views more  BMCBI 2006»
15 years 4 months ago
Analysis of optimal phenotypic space using elementary modes as applied to Corynebacterium glutamicum
Background: Quantification of the metabolic network of an organism offers insights into possible ways of developing mutant strain for better productivity of an extracellular metab...
Kalyan Gayen, K. V. Venkatesh
DATE
2007
IEEE
110views Hardware» more  DATE 2007»
15 years 11 months ago
Reconfigurable system-on-chip data processing units for space imaging instruments
Individual Data Processing Units (DPUs) are commonly used for operational control and specific data processing of scientific space instruments. To overcome the limitations of trad...
Björn Fiethe, Harald Michalik, C. Dierker, Bj...
AVBPA
2003
Springer
164views Biometrics» more  AVBPA 2003»
15 years 10 months ago
Personal Verification Using Palmprint and Hand Geometry Biometric
A new approach for the personal identification using hand images is presented. This paper attempts to improve the performance of palmprint-based verification system by integrating ...
Ajay Kumar, David C. M. Wong, Helen C. Shen, Anil ...
DSOM
2006
Springer
15 years 8 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...