Sciweavers

15 search results - page 1 / 3
» The Unix KISS: A Case Study
Sort
View
CORR
2007
Springer
135views Education» more  CORR 2007»
13 years 4 months ago
The Unix KISS: A Case Study
In this paper we show that the initial philosophy used in designing and developing UNIX in early times has been forgotten due to “fast practices”. We question the leitmotif th...
Franco Milicchio
ISSTA
2006
ACM
13 years 10 months ago
An empirical study of the robustness of MacOS applications using random testing
We report on the fourth in a series of studies on the reliability of application programs in the face of random input. Over the previous 15 years, we have studied the reliability ...
Barton P. Miller, Gregory Cooksey, Fredrick Moore
JCS
1998
338views more  JCS 1998»
13 years 4 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
JOI
2010
101views more  JOI 2010»
13 years 3 months ago
Can epidemic models describe the diffusion of topics across disciplines?
This paper introduces a new approach to describe the spread of research topics across disciplines using epidemic models. The approach is based on applying individual-based models ...
Istvan Z. Kiss, Mark Broom, Paul G. Craze, Ismael ...
JCS
2002
115views more  JCS 2002»
13 years 4 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis