Sciweavers

912 search results - page 127 / 183
» Anomaly
Sort
View
ICSE
2003
IEEE-ACM
14 years 9 months ago
Requirements Discovery during the Testing of Safety-Critical Software
This paper describes the role of requirements discovery during the testing of a safety-critical software system. Analysis of problem reports generated by the integration and syste...
Robyn R. Lutz, Ines Carmen Mikulski
ALT
2001
Springer
14 years 5 months ago
Learning Recursive Functions Refutably
Abstract. Learning of recursive functions refutably means that for every recursive function, the learning machine has either to learn this function or to refute it, i.e., to signal...
Sanjay Jain, Efim B. Kinber, Rolf Wiehagen, Thomas...
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 5 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
CHI
2010
ACM
14 years 3 months ago
Characterizing debate performance via aggregated twitter sentiment
Television broadcasters are beginning to combine social micro-blogging systems such as Twitter with television to create social video experiences around events. We looked at one s...
Nicholas Diakopoulos, David A. Shamma
WWW
2009
ACM
14 years 3 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...