Sciweavers

5799 search results - page 210 / 1160
» Position Paper
Sort
View
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
LREC
2008
85views Education» more  LREC 2008»
15 years 5 months ago
A Multilingual Database of Polarity Items
This paper presents three electronic collections of polarity items: (i) negative polarity items in Romanian, (ii) negative polarity items in German, and (iii) positive polarity it...
Beata Trawinski, Jan-Philipp Soehn
SDM
2007
SIAM
140views Data Mining» more  SDM 2007»
15 years 5 months ago
A General Framework for Mining Concept-Drifting Data Streams with Skewed Distributions
In recent years, there have been some interesting studies on predictive modeling in data streams. However, most such studies assume relatively balanced and stable data streams but...
Jing Gao, Wei Fan, Jiawei Han, Philip S. Yu
COMMA
2006
15 years 5 months ago
Justifying Actions by Accruing Arguments
This paper offers a logical formalisation of an argument-based account of reasoning about action, taking seriously the abductive nature of this form of reasoning. The particular qu...
Trevor J. M. Bench-Capon, Henry Prakken
CSREASAM
2006
15 years 5 months ago
An Efficient Bloom Filter Based Solution for Multiparty Private Matching
- The issue of privacy becomes more and more important. On the other hand, online collaboration among different parties is almost unavoidable. How to allow collaboration while prot...
Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. ...