Sciweavers

8 search results - page 2 / 2
» Detailed analysis of I O traces for large scale applications
Sort
View
NDSS
2008
IEEE
13 years 11 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 1 days ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
13 years 10 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath