Sciweavers

224 search results - page 44 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 5 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
MOBIHOC
2008
ACM
14 years 5 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
NETGAMES
2006
ACM
13 years 11 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
SIGSOFT
2005
ACM
14 years 6 months ago
KenyaEclipse: learning to program in eclipse
A fundamental part of a Computer Science degree is learning to program. Rather than starting students on a full commercial language, we favour using a dedicated "teaching lan...
Robert Chatley, Thomas Timbul
CVPR
2010
IEEE
13 years 4 months ago
Nonparametric Label-to-Region by Search
In this work, we investigate how to propagate annotated labels for a given single image from the image-level to their corresponding semantic regions, namely Label-toRegion (L2R), ...
Xiaobai Liu, Shuicheng Yan, Jiebo Luo