Sciweavers

3690 search results - page 553 / 738
» Computation with classical sequents
Sort
View
IMC
2006
ACM
15 years 11 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
ISSTA
2006
ACM
15 years 11 months ago
Path-oriented random testing
Test campaigns usually require only a restricted subset of paths in a program to be thoroughly tested. As random testing (RT) offers interesting fault-detection capacities at low ...
Arnaud Gotlieb, Matthieu Petit
IWCMC
2006
ACM
15 years 11 months ago
Analysis of mobile beacon aided in-range localization scheme in ad hoc wireless sensor networks
In this paper, We mathematically model the In-Range localization scheme in the presence of a Mobile Beacon. In the In-Range localization scheme, a sensor with unknown location is ...
T. V. Srinath, Anil Kumar Katti, V. S. Ananthanara...
SIGIR
2006
ACM
15 years 11 months ago
Tensor space model for document analysis
Vector Space Model (VSM) has been at the core of information retrieval for the past decades. VSM considers the documents as vectors in high dimensional space. In such a vector spa...
Deng Cai, Xiaofei He, Jiawei Han
UIST
2006
ACM
15 years 11 months ago
Personalizing routes
Navigation services (e.g., in-car navigation systems and online mapping sites) compute routes between two locations to help users navigate. However, these routes may direct users ...
Kayur Patel, Mike Y. Chen, Ian E. Smith, James A. ...