Sciweavers

1465 search results - page 52 / 293
» Making the Correct Mistakes
Sort
View
SIGIR
2009
ACM
15 years 6 months ago
Good abandonment in mobile and PC internet search
Query abandonment by search engine users is generally considered to be a negative signal. In this paper, we explore the concept of good abandonment. We define a good abandonment ...
Jane Li, Scott B. Huffman, Akihito Tokuda
OOPSLA
2007
Springer
15 years 6 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
SIGMOD
2005
ACM
174views Database» more  SIGMOD 2005»
15 years 5 months ago
Automated statistics collection in action
If presented with inaccurate statistics, even the most sophisticated query optimizers make mistakes. They may wrongly estimate the output cardinality of a certain operation and th...
Peter J. Haas, Mokhtar Kandil, Alberto Lerner, Vol...
CCS
2004
ACM
15 years 5 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
RAID
1999
Springer
15 years 4 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield