Sciweavers

2027 search results - page 375 / 406
» Process Support for Tools Interoperability
Sort
View
CCS
2007
ACM
15 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CLEAR
2007
Springer
117views Biometrics» more  CLEAR 2007»
15 years 3 months ago
Shared Linguistic Resources for the Meeting Domain
This paper describes efforts by the University of Pennsylvania's Linguistic Data Consortium to create and distribute shared linguistic resources – including data, annotation...
Meghan Lammie Glenn, Stephanie Strassel
CP
2007
Springer
15 years 3 months ago
Scheduling for Cellular Manufacturing
Abstract. Alcatel-Lucent is a major player in the eld of telecommunications. One of the products it oers to network operators is wireless infrastructure such as base stations. Su...
Roman van der Krogt, James Little, Kenneth Pulliam...
SAC
2005
ACM
15 years 3 months ago
Towards the prioritization of regression test suites with data flow information
Regression test prioritization techniques re-order the execution of a test suite in an attempt to ensure that defects are revealed earlier in the test execution phase. In prior wo...
Matthew J. Rummel, Gregory M. Kapfhammer, Andrew T...
BIRTHDAY
2005
Springer
15 years 3 months ago
Towards MultiMedia Instruction in Safe and Secure Systems
Abstract. The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a whole curriculum in the ar...
Bernd Krieg-Brückner