Sciweavers

2191 search results - page 306 / 439
» Evolutionary testing of classes
Sort
View
123
Voted
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
15 years 9 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
128
Voted
ICDAR
2005
IEEE
15 years 9 months ago
On-line Writer Adaptation for Handwriting Recognition using Fuzzy Inference Systems
We present an automatic on-line adaptation mechanism to the writer’s handwriting style for the recognition of isolated handwritten characters. The classifier is based on a Fuzz...
Harold Mouchère, Éric Anquetil, Nico...
121
Voted
APPROX
2005
Springer
84views Algorithms» more  APPROX 2005»
15 years 9 months ago
The Tensor Product of Two Codes Is Not Necessarily Robustly Testable
There has been significant interest lately in the task of constructing codes that are testable with a small number of random probes. Ben-Sasson and Sudan show that the repeated te...
Paul Valiant
116
Voted
ECOOP
2005
Springer
15 years 9 months ago
Lightweight Defect Localization for Java
A common method to localize defects is to compare the coverage of passing and failing program runs: A method executed only in failing runs, for instance, is likely to point to the ...
Valentin Dallmeier, Christian Lindig, Andreas Zell...
129
Voted
LPAR
2005
Springer
15 years 9 months ago
Incremental Integrity Checking: Limitations and Possibilities
Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be...
Henning Christiansen, Davide Martinenghi