Sciweavers

551 search results - page 85 / 111
» Preventing existence
Sort
View
CCS
2007
ACM
15 years 6 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
ICSM
2006
IEEE
15 years 5 months ago
Model-Based Testing of Community-Driven Open-Source GUI Applications
Although the world-wide-web (WWW) has significantly enhanced open-source software (OSS) development, it has also created new challenges for quality assurance (QA), especially for...
Qing Xie, Atif M. Memon
VEE
2012
ACM
214views Virtualization» more  VEE 2012»
13 years 7 months ago
CompSC: live migration with pass-through devices
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current...
Zhenhao Pan, Yaozu Dong, Yu Chen, Lei Zhang, Zhiji...
SQJ
2002
110views more  SQJ 2002»
14 years 11 months ago
A General Model of Unit Testing Efficacy
Much of software engineering is targeted towards identifying and removing existing defects while preventing the injection of new ones. Defect management is therefore one important ...
Houman Younessi, Panlop Zeephongsekul, Winai Bodhi...
CCS
2009
ACM
16 years 12 days ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao