Sciweavers

624 search results - page 81 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
WWW
2008
ACM
16 years 15 days ago
Learning to rank relational objects and its application to web search
Learning to rank is a new statistical learning technology on creating a ranking model for sorting objects. The technology has been successfully applied to web search, and is becom...
Tao Qin, Tie-Yan Liu, Xu-Dong Zhang, De-Sheng Wang...
WWW
2005
ACM
16 years 15 days ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
ICSE
2001
IEEE-ACM
15 years 4 months ago
Supporting Program Comprehension Using Semantic and Structural Information
The paper focuses on investigating the combined use of semantic and structural information of programs to support the comprehension tasks involved in the maintenance and reenginee...
Jonathan I. Maletic, Andrian Marcus
RAID
2010
Springer
14 years 10 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
FIW
1998
130views Communications» more  FIW 1998»
15 years 1 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières