Sciweavers

513 search results - page 50 / 103
» A framework for evaluating knowledge-mapping tools
Sort
View
WWW
2007
ACM
16 years 15 days ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
KBSE
2008
IEEE
15 years 6 months ago
Program Analysis with Dynamic Precision Adjustment
We present and evaluate a framework and tool for combining multiple program analyses which allows the dynamic (on-line) adjustment of the precision of each analysis depending on t...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
ECTEL
2007
Springer
15 years 6 months ago
FAsTA: A Folksonomy-Based Automatic Metadata Generator
Folksonomies provide a free source of keywords describing web resources, however, these keywords are free form and unstructured. In this paper, we describe a novel tool that conver...
Hend S. Al-Khalifa, Hugh C. Davis
ICISC
2004
122views Cryptology» more  ICISC 2004»
15 years 1 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
ECAL
2007
Springer
15 years 6 months ago
Grounding Action-Selection in Event-Based Anticipation
Anticipation is one of the key aspects involved in flexible and adaptive behavior. The ability for an autonomous agent to extract a relevant model of its coupling with the environ...
Philippe Capdepuy, Daniel Polani, Chrystopher L. N...