Sciweavers

279 search results - page 44 / 56
» Understanding the value of program analysis tools
Sort
View
IRI
2006
IEEE
14 years 1 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
BMCBI
2007
181views more  BMCBI 2007»
13 years 7 months ago
Versatile annotation and publication quality visualization of protein complexes using POLYVIEW-3D
Background: Macromolecular visualization as well as automated structural and functional annotation tools play an increasingly important role in the post-genomic era, contributing ...
Aleksey A. Porollo, Jaroslaw Meller
CPHYSICS
2007
71views more  CPHYSICS 2007»
13 years 7 months ago
Simulation of n-qubit quantum systems. III. Quantum operations
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
T. Radtke, S. Fritzsche
CCS
2008
ACM
13 years 9 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
HVC
2005
Springer
97views Hardware» more  HVC 2005»
14 years 1 months ago
An Extensible Open-Source Compiler Infrastructure for Testing
Testing forms a critical part of the development process for large-scale software, and there is growing need for automated tools that can read, represent, analyze, and transform th...
Daniel J. Quinlan, Shmuel Ur, Richard W. Vuduc