Sciweavers

121 search results - page 6 / 25
» Creating and Visualizing Test Data from Programming Exercise...
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 2 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
POPL
2008
ACM
14 years 9 months ago
From dirt to shovels: fully automatic tool generation from ad hoc data
An ad hoc data source is any semistructured data source for which useful data analysis and transformation tools are not readily available. Such data must be queried, transformed a...
Kathleen Fisher, David Walker, Kenny Qili Zhu, Pet...
SOQUA
2007
13 years 9 months ago
ConTest listeners: a concurrency-oriented infrastructure for Java test and heal tools
With the proliferation of the new multi-core personal computers, and the explosion of the usage of highly concurrent machine configuration, concurrent code moves from being writt...
Yarden Nir-Buchbinder, Shmuel Ur
SOFTVIS
2010
ACM
13 years 8 months ago
Heapviz: interactive heap visualization for program understanding and debugging
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structu...
Edward Aftandilian, Sean Kelley, Connor Gramazio, ...
ICMCS
2007
IEEE
159views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Multi-Modal Person-Profiles from Broadcast News Video
The need to analyze and index large amounts of video information is becoming more important as the way people consume media continues to change. In recent years, the push to attac...
Charlie K. Dagli, Sharad V. Rao, Thomas S. Huang