Sciweavers

1702 search results - page 230 / 341
» Doomed program points
Sort
View
IJCNN
2006
IEEE
15 years 11 months ago
Model Selection via Bilevel Optimization
— A key step in many statistical learning methods used in machine learning involves solving a convex optimization problem containing one or more hyper-parameters that must be sel...
Kristin P. Bennett, Jing Hu, Xiaoyun Ji, Gautam Ku...
WCRE
2006
IEEE
15 years 11 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
WCRE
2005
IEEE
15 years 10 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
ITICSE
2005
ACM
15 years 10 months ago
Implications of perspective in teaching objects first and object design
There are an increasing number of books published on the important topics of “object-oriented programming” and “object-oriented design” for use in education. However, obje...
Henrik Bærbak Christensen
PPSWR
2005
Springer
15 years 10 months ago
Computational Treatment of Temporal Notions: The CTTN-System
The CTTN-system is a computer program which provides advanced processing or temporal notions. The basic data structures of the CTTN-system are time points, crisp and fuzzy time int...
Hans Jürgen Ohlbach