Sciweavers

5675 search results - page 1051 / 1135
» Exploiting Chaos for Computation
Sort
View
114
Voted
ICML
2004
IEEE
16 years 1 months ago
Predictive automatic relevance determination by expectation propagation
In many real-world classification problems the input contains a large number of potentially irrelevant features. This paper proposes a new Bayesian framework for determining the r...
Yuan (Alan) Qi, Thomas P. Minka, Rosalind W. Picar...
105
Voted
ICSE
2009
IEEE-ACM
16 years 1 months ago
Taint-based directed whitebox fuzzing
We present a new automated white box fuzzing technique and a tool, BuzzFuzz, that implements this technique. Unlike standard fuzzing techniques, which randomly change parts of the...
Vijay Ganesh, Tim Leek, Martin C. Rinard
139
Voted
SIGSOFT
2003
ACM
16 years 1 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
105
Voted
WWW
2007
ACM
16 years 1 months ago
Globetp: template-based database replication for scalable web applications
Generic database replication algorithms do not scale linearly in throughput as all update, deletion and insertion (UDI) queries must be applied to every database replica. The thro...
Tobias Groothuyse, Swaminathan Sivasubramanian, Gu...
169
Voted
WWW
2007
ACM
16 years 1 months ago
Measuring semantic similarity between words using web search engines
Semantic similarity measures play important roles in information retrieval and Natural Language Processing. Previous work in semantic web-related applications such as community mi...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
« Prev « First page 1051 / 1135 Last » Next »