Sciweavers

1488 search results - page 271 / 298
» Measuring Semantic Coverage
Sort
View
JCS
2010
112views more  JCS 2010»
14 years 9 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
79
Voted
JUCS
2010
116views more  JUCS 2010»
14 years 9 months ago
Content Recommendation in APOSDLE using the Associative Network
: One of the success factors of Work Integrated Learning (WIL) is to provide the appropriate content to the users, both suitable for the topics they are currently working on, and t...
Hermann Stern, Rene Kaiser, Philip Hofmair, Peter ...
KBSE
2010
IEEE
14 years 9 months ago
A program differencing algorithm for verilog HDL
During code review tasks, comparing two versions of a hardware design description using existing program differencing tools such as diff is inherently limited because existing p...
Adam Duley, Chris Spandikow, Miryung Kim
KBSE
2010
IEEE
14 years 9 months ago
Variability modeling in the real: a perspective from the operating systems domain
Variability models represent the common and variable features of products in a product line. Several variability modeling languages have been proposed in academia and industry; ho...
Thorsten Berger, Steven She, Rafael Lotufo, Andrze...
ML
2010
ACM
155views Machine Learning» more  ML 2010»
14 years 9 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...