Sciweavers

175 search results - page 26 / 35
» Case Provenance: The Value of Remembering Case Sources
Sort
View
SIGSOFT
2004
ACM
14 years 7 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 29 days ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
INFOCOM
2007
IEEE
14 years 1 months ago
Paradox of Shortest Path Routing for Large Multi-Hop Wireless Networks
— In this paper, we analyze the impact of straight line routing in large homogeneous multi-hop wireless networks. We estimate the nodal load, which is defined as the number of p...
Sungoh Kwon, Ness B. Shroff
ICICS
2005
Springer
14 years 14 days ago
PCAV: Internet Attack Visualization on Parallel Coordinates
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
Hyunsang Choi, Heejo Lee
MLCW
2005
Springer
14 years 14 days ago
Estimating Predictive Variances with Kernel Ridge Regression
In many regression tasks, in addition to an accurate estimate of the conditional mean of the target distribution, an indication of the predictive uncertainty is also required. Ther...
Gavin C. Cawley, Nicola L. C. Talbot, Olivier Chap...