Sciweavers

458 search results - page 79 / 92
» Automatic system testing of programs without test oracles
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
ANCS
2011
ACM
12 years 7 months ago
ReClick - A Modular Dataplane Design Framework for FPGA-Based Network Virtualization
Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has hi...
Deepak Unnikrishnan, Justin Lu, Lixin Gao, Russell...
ICRA
2010
IEEE
178views Robotics» more  ICRA 2010»
13 years 5 months ago
Biomimetic optic flow sensing applied to a lunar landing scenario
Autonomous landing on unknown extraterrestrial bodies requires fast, noise-resistant motion processing to elicit appropriate steering commands. Flying insects excellently master vi...
Florent Valette, Franck Ruffier, Stéphane V...
CCS
2007
ACM
14 years 1 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
ICFP
2007
ACM
14 years 7 months ago
Ott: effective tool support for the working semanticist
It is rare to give a semantic definition of a full-scale programming language, despite the many potential benefits. Partly this is because the available metalanguages for expressi...
Peter Sewell, Francesco Zappa Nardelli, Scott Owen...