Sciweavers

1812 search results - page 191 / 363
» Test Early, Test Often
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
OOPSLA
2004
Springer
15 years 3 months ago
Finding bugs is easy
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. Whil...
David Hovemeyer, William Pugh
82
Voted
CIKM
2003
Springer
15 years 3 months ago
Addressing the lack of direct translation resources for cross-language retrieval
Most cross language information retrieval research concentrates on language pairs for which direct, rich, and often multiple translation resources already exist. However, for most...
Lisa Ballesteros, Mark Sanderson
SSDBM
2010
IEEE
188views Database» more  SSDBM 2010»
15 years 3 months ago
Similarity Estimation Using Bayes Ensembles
Similarity search and data mining often rely on distance or similarity functions in order to provide meaningful results and semantically meaningful patterns. However, standard dist...
Tobias Emrich, Franz Graf, Hans-Peter Kriegel, Mat...
78
Voted
ICPADS
2002
IEEE
15 years 3 months ago
A Mobile Cache Consistency Protocol Using Shareable Read/Write Time Locks
Object caching is often used to improve the performance of mobile applications, but the gain is often lessened by the additional load of maintaining consistency between an origina...
Abhinav Vora, Zahir Tari, Peter Bertók, Kwo...