Sciweavers

4190 search results - page 347 / 838
» Type Class Directives
Sort
View
DIMVA
2010
15 years 6 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
IPCO
2010
160views Optimization» more  IPCO 2010»
15 years 6 months ago
On Column-Restricted and Priority Covering Integer Programs
In a column-restricted covering integer program (CCIP), all the non-zero entries of any column of the constraint matrix are equal. Such programs capture capacitated versions of cov...
Deeparnab Chakrabarty, Elyot Grant, Jochen Kö...
LREC
2010
178views Education» more  LREC 2010»
15 years 6 months ago
Like Finding a Needle in a Haystack: Annotating the American National Corpus for Idiomatic Expressions
This paper presents the details of a pilot study in which we tagged portions of the American National Corpus (ANC) for idioms composed of verb-noun constructions, prepositional ph...
Laura Street, Nathan Michalov, Rachel Silverstein,...
SDM
2010
SIAM
158views Data Mining» more  SDM 2010»
15 years 6 months ago
On the Use of Combining Rules in Relational Probability Trees
A relational probability tree (RPT) is a type of decision tree that can be used for probabilistic classification of instances with a relational structure. Each leaf of an RPT cont...
Daan Fierens
FECS
2006
100views Education» more  FECS 2006»
15 years 6 months ago
Pair Programming: Not for Everyone?
- Developments in CS1 pedagogy seek to improve the capabilities of students in their understanding of how to write programs. This involves learning how to solve various types of pr...
Jacob P. Somervell