Sciweavers

1322 search results - page 114 / 265
» Efficient Goal-Directed Exploration
Sort
View
126
Voted
ICML
2009
IEEE
16 years 4 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...
105
Voted
SIGMOD
2002
ACM
91views Database» more  SIGMOD 2002»
16 years 3 months ago
Phoenix Project: Fault-Tolerant Applications
After a system crash, databases recover to the last committed transaction, but applications usually either crash or cannot continue. The Phoenix purpose is to enable application s...
Roger S. Barga, David B. Lomet
103
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Computer-Assisted Assume/Guarantee Reasoning with VeriSoft
We show how the state space exploration tool VeriSoft can be used to analyze parallel C/C++ programs compositionally. VeriSoft is used to check assume/guarantee specifications of ...
Jürgen Dingel
112
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
Suade: Topology-Based Searches for Software Investigation
The investigation of a software system prior to a modification task often constitutes an important fraction of the overall effort associated with the task. We present Suade, an Ec...
Frédéric Weigand Warr, Martin P. Rob...
115
Voted
PERCOM
2008
ACM
16 years 3 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar