Sciweavers

396 search results - page 77 / 80
» Using Refinement Checking as System Testing
Sort
View
TSE
2008
165views more  TSE 2008»
14 years 9 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
PRICAI
2000
Springer
15 years 1 months ago
Discovery of Shared Topics Networks among People - A Simple Approach to Find Community Knowledge from WWW Bookmarks
In this paper, we propose a system called kMedia that can assist users to form knowledge for community by showing shared topics networks (STN) among them. One of the important aspe...
Hideaki Takeda, Takeshi Matsuzuka, Yuichiro Tanigu...
AINTEC
2007
Springer
15 years 3 months ago
WOD - Proxy-Based Web Object Delivery Service
With the tremendous growth of World Wide Web (WWW), the door has been opened to a multitude of services and information for even the most casual of users. Today, many wireless and ...
Kai-Hsiang Yang, Jan-Ming Ho
ASPLOS
2006
ACM
15 years 3 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
99
Voted
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 7 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...