Sciweavers

35 search results - page 7 / 7
» A Formal Framework for Program Anomaly Detection
Sort
View
ICFP
2006
ACM
14 years 5 months ago
Static typing for a faulty lambda calculus
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to change state. These faults do not cause permanent damage, but may result in incorr...
David Walker, Lester W. Mackey, Jay Ligatti, Georg...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 5 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
SIGSOFT
2007
ACM
14 years 6 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
AOSD
2004
ACM
13 years 10 months ago
Composition, reuse and interaction analysis of stateful aspects
Aspect-Oriented Programming promises separation of concerns at the implementation level. However, aspects are not always orthogonal and aspect interaction is a fundamental problem...
Rémi Douence, Pascal Fradet, Mario Süd...
CORR
2004
Springer
140views Education» more  CORR 2004»
13 years 5 months ago
Integrating Defeasible Argumentation and Machine Learning Techniques
The field of machine learning (ML) is concerned with the question of how to construct algorithms that automatically improve with experience. In recent years many successful ML app...
Sergio Alejandro Gómez, Carlos Iván ...