Sciweavers

499 search results - page 8 / 100
» A Study on Latent Vulnerabilities
Sort
View
SP
2007
IEEE
14 years 5 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
DRM
2003
Springer
14 years 4 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
WCRE
2006
IEEE
14 years 4 months ago
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study
Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the proce...
Marco Lormans, Hans-Gerhard Groß, Arie van D...
EMNLP
2008
14 years 8 days ago
Studying the History of Ideas Using Topic Models
How can the development of ideas in a scientific field be studied over time? We apply unsupervised topic modeling to the ACL Anthology to analyze historical trends in the field of...
David Hall, Daniel Jurafsky, Christopher D. Mannin...
CIKM
2009
Springer
14 years 5 months ago
Text segmentation via topic modeling: an analytical study
In this paper, the task of text segmentation is approached from a topic modeling perspective. We investigate the use of latent Dirichlet allocation (LDA) topic model to segment a ...
Hemant Misra, François Yvon, Joemon M. Jose...