Sciweavers

713 search results - page 132 / 143
» Using information about functions in selecting test cases
Sort
View
BMCBI
2010
162views more  BMCBI 2010»
13 years 7 months ago
SNP-RFLPing 2: an updated and integrated PCR-RFLP tool for SNP genotyping
Background: PCR-restriction fragment length polymorphism (RFLP) assay is a cost-effective method for SNP genotyping and mutation detection, but the manual mining for restriction e...
Hsueh-Wei Chang, Yu-Huei Cheng, Li-Yeh Chuang, Che...
IWIC
2007
Springer
14 years 1 months ago
Collaborative Platform for Multilingual Resource Development and Intercultural Communication
The Internet has already connected people and established a mature online community. The use of WWW is also in the main stream of disseminating one’s information and services. In...
Virach Sornlertlamvanich, Thatsanee Charoenporn, K...
ICISS
2010
Springer
13 years 5 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
ICRA
2003
IEEE
184views Robotics» more  ICRA 2003»
14 years 25 days ago
Trajectory planning for smooth transition of a biped robot
- This paper presents a third-order spline interpolation based trajectory planning method which is aiming to achieve smooth biped swing leg trajectory by reducing the instant veloc...
Zhe Tang, Changjiu Zhou, Zengqi Sun
ICS
2004
Tsinghua U.
14 years 28 days ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang