Sciweavers

6960 search results - page 1249 / 1392
» Continuity Analysis of Programs
Sort
View
ICNP
2007
IEEE
15 years 9 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu
99
Voted
ISCC
2007
IEEE
141views Communications» more  ISCC 2007»
15 years 9 months ago
Aspectizing a Web Server for Adaptation
— Web servers are exposed to extremely changing runtime requirements. Going offline to adjust policies and configuration parameters in order to cope with such requirements is n...
Wasif Gilani, Julio Sincero, Olaf Spinczyk, Wolfga...
IWPC
2007
IEEE
15 years 9 months ago
Tracking Objects to Detect Feature Dependencies
The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been ...
Adrian Lienhard, Orla Greevy, Oscar Nierstrasz
KBSE
2007
IEEE
15 years 9 months ago
Feature location via information retrieval based filtering of a single scenario execution trace
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...
Dapeng Liu, Andrian Marcus, Denys Poshyvanyk, Vacl...
COCO
2007
Springer
109views Algorithms» more  COCO 2007»
15 years 9 months ago
Perfect Parallel Repetition Theorem for Quantum XOR Proof Systems
We consider a class of two-prover interactive proof systems where each prover returns a single bit to the verifier and the verifier’s verdict is a function of the XOR of the tw...
Richard Cleve, William Slofstra, Falk Unger, Sarva...
« Prev « First page 1249 / 1392 Last » Next »