Sciweavers

677 search results - page 37 / 136
» Dependent Types from Counterexamples
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
BTW
2003
Springer
93views Database» more  BTW 2003»
15 years 2 months ago
Information Integration in a Global Enterprise: Some Experiences from a Financial Services Company
: In most commercial enterprises, information is scattered across a large number of (legacy) data stores. Moreover, it is nearly impossible to obtain funding to replace these data ...
Robert Marti
PAMI
2007
219views more  PAMI 2007»
14 years 9 months ago
Shape Estimation Using Polarization and Shading from Two Views
—This paper presents a novel method for 3D surface reconstruction that uses polarization and shading information from two views. The method relies on the polarization data acquir...
Gary Atkinson, Edwin R. Hancock
PLDI
2011
ACM
14 years 16 days ago
Systematic editing: generating program transformations from an example
Software modifications are often systematic—they consist of similar, but not identical, program changes to multiple contexts. Existing tools for systematic program transformati...
Na Meng, Miryung Kim, Kathryn S. McKinley
KDD
2007
ACM
165views Data Mining» more  KDD 2007»
15 years 10 months ago
Finding low-entropy sets and trees from binary data
The discovery of subsets with special properties from binary data has been one of the key themes in pattern discovery. Pattern classes such as frequent itemsets stress the co-occu...
Eino Hinkkanen, Hannes Heikinheimo, Heikki Mannila...