Sciweavers

1848 search results - page 32 / 370
» A Question Answering System for the Operation of Software Ap...
Sort
View
CCS
2010
ACM
13 years 8 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
CIKM
2011
Springer
12 years 7 months ago
Improved answer ranking in social question-answering portals
Community QA portals provide an important resource for non-factoid question-answering. The inherent noisiness of user-generated data makes the identification of high-quality cont...
Felix Hieber, Stefan Riezler
APSEC
2004
IEEE
13 years 11 months ago
Systematic Operational Profile Development for Software Components
An operational profile is a quantification of the expected use of a system. Determining an operational profile for software is a crucial and difficult part of software reliability...
Rakesh Shukla, David A. Carrington, Paul A. Stroop...
SIGMETRICS
1999
ACM
14 years 2 hour ago
Availability and Utility of Idle Memory in Workstation Clusters
In this paper, we examine the availability and utility of idle memory in workstation clusters. We attempt to answer the following questions. First, how much of the total memory in...
Anurag Acharya, Sanjeev Setia
USS
2008
13 years 10 months ago
Research Challenges for the Security of Control Systems
In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirem...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...