: Testing of a software application serves the accomplishment of two dis tinct objectives: ensuring functionality and end-user acceptance. However, with an increasing desire for mo...
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
The First Symposium on the Personal Web is colocated with CASCON 2010 and is sponsored by IBM CAS Research. This symposium includes key researchers and practitioners in a range of...
Mark H. Chignell, James R. Cordy, Joanna W. Ng, Ye...
This paper investigates cooperative search strategies for agents engaged in costly search in a complex environment. Searching cooperatively, several search goals can be satisfied w...
Abstract. In this paper an effective context-based approach for interactive similarity queries is presented. By exploiting the notion of image “context”, it is possible to asso...