Sciweavers

4166 search results - page 202 / 834
» Automating the constraining process
Sort
View
CCS
2007
ACM
15 years 9 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
AADEBUG
2005
Springer
15 years 8 months ago
Automated bug isolation via program chipping
This paper introduces program chipping, a simple yet effective technique to isolate bugs. This technique automatically removes or chips away parts of a program so that the part t...
Chad D. Sterling, Ronald A. Olsson
SAC
2003
ACM
15 years 8 months ago
Supervised Term Weighting for Automated Text Categorization
The construction of a text classifier usually involves (i) a phase of term selection, in which the most relevant terms for the classification task are identified, (ii) a phase ...
Franca Debole, Fabrizio Sebastiani
134
Voted
CIKM
2003
Springer
15 years 8 months ago
Automated index management for distributed web search
Distributed heterogeneous search systems are an emerging phenomenon in Web search, in which independent topic-specific search engines provide search services, and metasearchers d...
Rinat Khoussainov, Nicholas Kushmerick
KDD
2010
ACM
293views Data Mining» more  KDD 2010»
15 years 7 months ago
BioSnowball: automated population of Wikis
Internet users regularly have the need to find biographies and facts of people of interest. Wikipedia has become the first stop for celebrity biographies and facts. However, Wik...
Xiaojiang Liu, Zaiqing Nie, Nenghai Yu, Ji-Rong We...