Sciweavers

Share
4 search results - page 1 / 1
» Defect categorization: making use of a decade of widely vary...
Sort
View
ESEM
2008
ACM
9 years 5 months ago
Defect categorization: making use of a decade of widely varying historical data
This paper describes our experience in aggregating a number of historical datasets containing inspection defect data using different categorization schemes. Our goal was to make u...
Carolyn B. Seaman, Forrest Shull, Myrna Regardie, ...
KDD
2008
ACM
217views Data Mining» more  KDD 2008»
10 years 4 months ago
Stream prediction using a generative model based on frequent episodes in event sequences
This paper presents a new algorithm for sequence prediction over long categorical event streams. The input to the algorithm is a set of target event types whose occurrences we wis...
Srivatsan Laxman, Vikram Tankasali, Ryen W. White
CCS
2015
ACM
3 years 11 months ago
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Exploitation of memory-corruption vulnerabilities in widelyused software has been a threat for over two decades and no end seems to be in sight. Since performance and backwards co...
Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen
ISCA
2009
IEEE
161views Hardware» more  ISCA 2009»
9 years 10 months ago
AnySP: anytime anywhere anyway signal processing
In the past decade, the proliferation of mobile devices has increased at a spectacular rate. There are now more than 3.3 billion active cell phones in the world—a device that we...
Mark Woh, Sangwon Seo, Scott A. Mahlke, Trevor N. ...
books