Sciweavers

499 search results - page 28 / 100
» A Study on Latent Vulnerabilities
Sort
View
93
Voted
JOCN
2011
94views more  JOCN 2011»
14 years 7 months ago
Establishing Causal Coherence across Sentences: An ERP Study
■ This study examined neural activity associated with establishing causal relationships across sentences during on-line comprehension. ERPs were measured while participants read...
Gina R. Kuperberg, Martin Paczynski, Tali Ditman
EMMCVPR
2011
Springer
14 years 5 days ago
Optimization of Robust Loss Functions for Weakly-Labeled Image Taxonomies: An ImageNet Case Study
The recently proposed ImageNet dataset consists of several million images, each annotated with a single object category. However, these annotations may be imperfect, in the sense t...
Julian John McAuley, Arnau Ramisa, Tibério ...
ESEM
2010
ACM
14 years 11 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ICON
2007
IEEE
15 years 6 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
SIGMOD
2008
ACM
120views Database» more  SIGMOD 2008»
16 years 17 days ago
Focused iterative testing: a test automation case study
Timing-related defects are among the most difficult types of defects to catch while testing software. They are by definition difficult to reproduce and hence they are difficult to...
Mechelle Gittens, Pramod Gupta, David Godwin, Hebe...