Sciweavers

451 search results - page 14 / 91
» Identifying Facts for TCBR
Sort
View
ISSTA
2012
ACM
13 years 2 days ago
Isolating failure causes through test case generation
Manual debugging is driven by experiments—test runs that narrow down failure causes by systematically confirming or excluding individual factors. The BUGEX approach leverages t...
Jeremias Röbetaler, Gordon Fraser, Andreas Ze...
69
Voted
ISSAC
2005
Springer
63views Mathematics» more  ISSAC 2005»
15 years 3 months ago
Symbolic-numeric completion of differential systems by homotopy continuation
Two ideas are combined to construct a hybrid symbolicnumeric differential-elimination method for identifying and including missing constraints arising in differential systems. F...
Greg Reid, Jan Verschelde, Allan D. Wittkopf, Weny...
65
Voted
ACSAC
2001
IEEE
15 years 1 months ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch
ICISC
2004
122views Cryptology» more  ICISC 2004»
14 years 11 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
CORR
2010
Springer
115views Education» more  CORR 2010»
14 years 9 months ago
Online Cake Cutting
We propose an online form of the cake cutting problem. This models situations where players arrive and depart during the process of dividing a resource. We show that well known fa...
Toby Walsh