David James

Results: 1444



#Item
371Minutes / Motion / Table / Recognition / Government / Parliamentary procedure / Principles / Second

ACJS MIDYEAR BOARD MEETING MINUTES SUNDAY, AUGUST 26, 2012 & MONDAY, AUGUST 27, 2012 Dallas, Texas MEMBERS PRESENT: Craig Hemmens, James Frank, Brian Payne, Melissa Barlow, David Owens (late arrival), Jill Gordon, Nicole

Add to Reading List

Source URL: www.acjs.org

Language: English - Date: 2015-04-12 22:02:34
372Systematic review / Evaluation methods / Research methods / Meta-analysis / Nursing research / Qualitative research / Research / Survey methodology / Evaluation / Science / Knowledge / Methodology

ONE Introducing systematic reviews David Gough, Sandy Oliver and James Thomas Aims of chapter This chapter:

Add to Reading List

Source URL: www.uk.sagepub.com

Language: English - Date: 2012-03-05 23:12:39
373

Howe, David Everitt. James Hoff: Skywiper, ArtReview, vol 67 no 1, January & February 2015, print.

Add to Reading List

Source URL: callicoonfinearts.com

- Date: 2015-01-22 10:37:22
    374Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

    Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    375Predicate transformer semantics / Program logic / KeY / IP / Function / Algorithm / NP / Symbolic execution / Communications protocol / Theoretical computer science / Mathematics / Applied mathematics

    Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    376Malware / Hacking / Software testing / Buffer overflow / Vulnerability / Computer worm / Computer virus / Social vulnerability / Cyberwarfare / Computer security / Failure

    Sting: An End-to-End Self-Healing System for Defending against Internet Worms David Brumley1 , James Newsome2 , and Dawn Song3 1 2 3

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    377Re B / Consent / Supreme Court of the United Kingdom / David Neuberger /  Baron Neuberger of Abbotsbury / Medical law / Medical ethics / Law / Criminal law / Court of Appeal of England and Wales

    Aintree University Hospitals NHS Foundation Trust (Respondent) v James (Appellant)

    Add to Reading List

    Source URL: advancecareplanning.org.au

    Language: English - Date: 2013-11-03 09:44:22
    378Database trigger / Trigger / Computer virus / Pointer / Computing / Software engineering / Computer programming / Abstract interpretation / Symbolic execution / Malware

    1 Automatically Identifying Trigger-based Behavior in Malware David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin Carnegie Mellon University

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    379Symbolic execution / Software engineering / Programming language implementation / Malware / Algorithm / Assembly language / KeY / Computer program / Software bug / Computing / Formal methods / Abstract interpretation

    BitScope: Automatically Dissecting Malicious Binaries David Brumley, Cody Hartwig, Min Gyung Kang, Zhenkai Liang James Newsome, Pongsin Poosankam, Dawn Song, Heng Yin March 18, 2007 Last Modified: May 23, 2007 CMU-CS-07-

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    380Molecular biology / Epigenetics / Sordariales / Neurospora crassa / Gene silencing / Point mutation / DNA methylation / RNA interference / Neurospora / Biology / Genetics / Gene expression

    articles The genome sequence of the filamentous fungus Neurospora crassa James E. Galagan1, Sarah E. Calvo1, Katherine A. Borkovich2, Eric U. Selker3, Nick D. Read4, David Jaffe1, William FitzHugh5, Li-Jun Ma1, Serge Sm

    Add to Reading List

    Source URL: web.mit.edu

    Language: English - Date: 2003-11-18 19:05:14
    UPDATE