Sciweavers

3547 search results - page 669 / 710
» Pseudo-Exhaustive Testing for Software
Sort
View
IWMM
2010
Springer
173views Hardware» more  IWMM 2010»
15 years 2 months ago
CETS: compiler enforced temporal safety for C
Temporal memory safety errors, such as dangling pointer dereferences and double frees, are a prevalent source of software bugs in unmanaged languages such as C. Existing schemes t...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
77
Voted
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 2 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
ICCS
2001
Springer
15 years 2 months ago
High-Performance Algorithm Engineering for Computational Phylogenetics
Abstract. Phylogeny reconstruction from molecular data poses complex optimization problems: almost all optimization models are NP-hard and thus computationally intractable. Yet app...
Bernard M. E. Moret, David A. Bader, Tandy Warnow
IUI
2000
ACM
15 years 2 months ago
Learning to recommend from positive evidence
In recent years, many systems and approaches for recommending information, products or other objects have been developed. In these systems, often machine learning methods that nee...
Ingo Schwab, Wolfgang Pohl, Ivan Koychev
CIA
2000
Springer
15 years 2 months ago
Towards Information Agent Interoperability
Abstract. Currently, many kinds of information agents for di erent purposes exist. However, agents from di erent systems are still unable to cooperate, even if they accurately foll...
Stefan Haustein, Sascha Lüdecke