Sciweavers

506 search results - page 20 / 102
» Proving Properties about Lists Using Containers
Sort
View
IMC
2007
ACM
14 years 11 months ago
Using uncleanliness to predict future botnet addresses
The increased use of botnets as an attack tool and the awareness attackers have of blocking lists leads to the question of whether we can effectively predict future bot locations...
M. Patrick Collins, Timothy J. Shimeall, Sidney Fa...
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
15 years 1 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
FASE
2005
Springer
15 years 3 months ago
Checking Memory Safety with Blast
Abstract. Blast is an automatic verification tool for checking temporal safety properties of C programs. Given a C program and a temporal safety property, Blast statically proves ...
Dirk Beyer, Thomas A. Henzinger, Ranjit Jhala, Rup...
BMCBI
2005
125views more  BMCBI 2005»
14 years 9 months ago
A simple approach for protein name identification: prospects and limits
Background: Significant parts of biological knowledge are available only as unstructured text in articles of biomedical journals. By automatically identifying gene and gene produc...
Katrin Fundel, Daniel Güttler, Ralf Zimmer, J...
CSFW
2006
IEEE
15 years 3 months ago
Computationally Sound Compositional Logic for Key Exchange Protocols
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...