Sciweavers

1079 search results - page 93 / 216
» Predictive testing: amplifying the effectiveness of software...
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
ICSM
2005
IEEE
15 years 10 months ago
Incremental Maintenance of Software Artifacts
We have built a software development tool, CLIME, that uses constraints to ensure the consistency of the different artifacts associated with software. This approach to software dev...
Steven P. Reiss
IADIS
2003
15 years 5 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
ECIR
2010
Springer
15 years 5 months ago
Finding Wormholes with Flickr Geotags
We propose a kernel convolution method to predict similar locations (wormholes) based on human travel behaviour. A scaling parameter can be used to define a set of relevant users t...
Maarten Clements, Pavel Serdyukov, Arjen P. de Vri...
KDD
1994
ACM
117views Data Mining» more  KDD 1994»
15 years 8 months ago
Application of the TETRAD II Program to the Study of Student Retention in U.S. Colleges
We applied TETRAD II, a causal discovery program developed in Carnegie Mellon University's Department of Philosophy, to a database containing information on 204 U.S. colleges...
Marek J. Druzdze, Clark Glymour