Sciweavers

2237 search results - page 83 / 448
» On the Security of Random Sources
Sort
View
OOPSLA
2007
Springer
15 years 11 months ago
Randoop: feedback-directed random testing for Java
RANDOOP FOR JAVA generates unit tests for Java code using feedback-directed random test generation. Below we describe RANDOOP’s input, output, and test generation algorithm. We ...
Carlos Pacheco, Michael D. Ernst
BTW
2005
Springer
177views Database» more  BTW 2005»
15 years 10 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
CORR
2007
Springer
92views Education» more  CORR 2007»
15 years 4 months ago
Throughput Scaling in Random Wireless Networks: A Non-Hierarchical Multipath Routing Strategy
— Franceschetti et al. [1] have recently shown that per-node throughput in an extended (i.e., geographically expanding), ad hoc wireless network with Θ(n) randomly distributed n...
Awlok Josan, Mingyan Liu, David L. Neuhoff, S. San...
ICIP
2009
IEEE
16 years 6 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
EUROCAST
2005
Springer
166views Hardware» more  EUROCAST 2005»
15 years 10 months ago
A New Pseudo-Random Generator Based on Gollmann Cascades of Baker-Register-Machines
In this paper, we present a new pseudo-random sequence generator, constructed by the generalized discrete Baker transformation. This new generator is called Cascaded Baker Register...
Dominik Jochinger, Franz Pichler