Search
Search results
2651 results found
Dr. Wellington Hsu: Why robotic technology could revolutionize spine surgery, and where AI fits in
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse...
Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa.
Porttitor, J., P. Priya, M. Dotor, P Pretium, N. Lee-Walsh, and A. Li. 2023. “Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa..”
Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa.
Porttitor, J., P. Priya, M. Dotor, P Pretium, N. Lee-Walsh, and A. Li. 2022. “Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa..”
Integrating safety analysis with functional modeling
Ariss, Omar El, Dianxiang Xu, and Eric Wong. 2011. “Integrating Safety Analysis With Functional Modeling”. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 41 (4): 610-24.
Statistical unigram analysis for source code repository
Xu, Weifeng, Dianxiang Xu, Abdulrahman Alatawi, Omar El Ariss, and Yunkai Liu. 2018. “Statistical Unigram Analysis for Source Code Repository”. International Journal of Semantic Computing 12 (02): 237-60.
Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies
Xu, Dianxiang, Ning Shen, and Yunpeng Zhang. 2015. “Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies”. International Journal of Software Engineering and Knowledge Engineering 25 (09n10): 1551-71.
Testing aspect-oriented programs with finite state machines
Xu, Dianxiang, Omar El-Ariss, Weifeng Xu, and Linzhang Wang. 2012. “Testing Aspect-Oriented Programs With Finite State Machines”. Software Testing, Verification and Reliability 22 (4): 267-93.
Automated security test generation with formal threat models
Xu, Dianxiang, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, and Weifeng Xu. 2012. “Automated Security Test Generation With Formal Threat Models”. IEEE Transactions on Dependable and Secure Computing 9 (4): 526-40.
Modeling security attacks with statecharts
Ariss, Omar El, and Dianxiang Xu. 2011. “Modeling Security Attacks With Statecharts”. Proceedings of the Joint ACM SIGSOFT Conference—QoSA and ACM SIGSOFT Symposium—ISARCS on Quality of Software Architectures—QoSA and Architecting Critical Systems&Mdash;ISARCS, 123-32.