Sciweavers

4079 search results - page 681 / 816
» Differential Testing for Software
Sort
View
110
Voted
NDSS
2007
IEEE
15 years 8 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
123
Voted
CLEF
2007
Springer
15 years 8 months ago
CLEF 2007: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2007 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual and cross-language textual d...
Giorgio Maria Di Nunzio, Nicola Ferro, Thomas Mand...
106
Voted
JCDL
2006
ACM
71views Education» more  JCDL 2006»
15 years 8 months ago
Using controlled query generation to evaluate blind relevance feedback algorithms
Currently in document retrieval there are many algorithms each with different strengths and weakness. There is some difficulty, however, in evaluating the impact of the test quer...
Chris Jordan, Carolyn R. Watters, Qigang Gao
133
Voted
CASES
2004
ACM
15 years 8 months ago
Safely exploiting multithreaded processors to tolerate memory latency in real-time systems
A coarse-grain multithreaded processor can effectively hide long memory latencies by quickly switching to an alternate task when the active task issues a memory request, improving...
Ali El-Haj-Mahmoud, Eric Rotenberg
FGCS
1992
103views more  FGCS 1992»
15 years 3 months ago
Parallel Inference Machine PIM
: There have been no major control problems during the first three years of the new Tokaido-Sanyo Shinkansen (bullet train) Programmed Route Control (PRC) computer system. Prior to...
Kazuo Taki