DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

8 9 10
hits: 95
91.
  • A Hybrid Approach to Detect... A Hybrid Approach to Detecting Security Defects in Programs
    Lian Yu; Jun Zhou; Yue Yi ... 2009 Ninth International Conference on Quality Software, 2009-Aug.
    Conference Proceeding

    Static analysis works well at checking defects that clearly map to source code constructs. Model checking can find defects of deadlocks and routing loops that are not easily detected by static ...
Full text
Available for: UL
92.
Full text
93.
Full text
94.
  • Business Intelligence Recov... Business Intelligence Recovery from Legacy Code
    Jian Kang; Jianjun Pu; Jianchu Huang ... 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008-July
    Conference Proceeding

    The paper introduces a concept, BI (business intelligence) recovery, in software reverse engineering research. It is named to alternate "business asset", because we discover the abstract knowledge ...
Full text
Available for: UL
95.
  • 基于蛋白质结构和理化性质的鱼糜蛋白-油脂相互作用 基于蛋白质结构和理化性质的鱼糜蛋白-油脂相互作用
    周佳滢; 胡之恒; 黄佳茵 ... 食品科学, 2023, Volume: 44, Issue: 8
    Magazine Article
    Peer reviewed

    TS254.1; ...
Full text
Available for: UL

Load filters