Sciweavers

519 search results - page 52 / 104
» Using Goal-Models to Analyze Variability
Sort
View
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SSDBM
2008
IEEE
150views Database» more  SSDBM 2008»
14 years 3 months ago
Summarizing Two-Dimensional Data with Skyline-Based Statistical Descriptors
Much real data consists of more than one dimension, such as financial transactions (eg, price × volume) and IP network flows (eg, duration × numBytes), and capture relationship...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
ICC
2007
IEEE
121views Communications» more  ICC 2007»
14 years 3 months ago
BER Analysis in A Generalized UWB Frequency Selective Fading Channel With Randomly Arriving Clusters and Rays
— In this paper, we present an analytical method to evaluate the bit error rate (BER) of the ultra-wideband (UWB) system in the IEEE 802.15.4a standardized channel model. The IEE...
Wei-Cheng Liu, Li-Chun Wang
SIAMDM
2008
99views more  SIAMDM 2008»
13 years 8 months ago
Phase Changes in Subtree Varieties in Random Recursive and Binary Search Trees
We study the variety of subtrees lying on the fringe of recursive trees and binary search trees by analyzing the distributional behavior of Xn,k, which counts the number of subtree...
Qunqiang Feng, Hosam M. Mahmoud, Alois Panholzer
NAR
2007
120views more  NAR 2007»
13 years 8 months ago
TOPOFIT-DB, a database of protein structural alignments based on the TOPOFIT method
TOPOFIT-DB (T-DB) is a public web-based database of protein structural alignments based on the TOPOFIT method, providing a comprehensive resource for comparative analysis of prote...
Chesley M. Leslin, Alexej Abyzov, Valentin A. Ilyi...