Sciweavers

537 search results - page 87 / 108
» A Call to Regularity
Sort
View
SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SMC
2010
IEEE
198views Control Systems» more  SMC 2010»
13 years 6 months ago
Deep web data extraction
—Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web...
Jer Lang Hong
SMC
2010
IEEE
276views Control Systems» more  SMC 2010»
13 years 6 months ago
A Modified Invasive Weed Optimization Algorithm for training of feed- forward Neural Networks
— Invasive Weed Optimization Algorithm IWO) is an ecologically inspired metaheuristic that mimics the process of weeds colonization and distribution and is capable of solving mul...
Ritwik Giri, Aritra Chowdhury, Arnob Ghosh, Swagat...
VL
2010
IEEE
218views Visual Languages» more  VL 2010»
13 years 6 months ago
Using Association Metrics to Help Users Navigate API Documentation
-- In the past decade there has been spectacular growth in the number and size of third-party libraries, frameworks, toolkits and other Application Programming Interfaces (APIs) av...
Daniel S. Eisenberg, Jeffrey Stylos, Andrew Faulri...
ACL
2010
13 years 5 months ago
Cross-Lingual Latent Topic Extraction
Probabilistic latent topic models have recently enjoyed much success in extracting and analyzing latent topics in text in an unsupervised way. One common deficiency of existing to...
Duo Zhang, Qiaozhu Mei, ChengXiang Zhai