Sciweavers

1103 search results - page 177 / 221
» Evaluating CBR Systems Using Different Data Sources: A Case ...
Sort
View
DSN
2000
IEEE
13 years 11 months ago
On the Emulation of Software Faults by Software Fault Injection
This paper presents an experimental study on the emulation of software faults by fault injection. In a first experiment, a set of real software faults has been compared with fault...
Henrique Madeira, Diamantino Costa, Marco Vieira
AVSS
2009
IEEE
14 years 2 months ago
Event Composition with Imperfect Information for Bus Surveillance
—Demand for bus surveillance is growing due to the increased threats of terrorist attack, vandalism and litigation. However, CCTV systems are traditionally used in forensic mode,...
Jianbing Ma, Weiru Liu, Paul Miller, Weiqi Yan
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
SIGMOD
2011
ACM
219views Database» more  SIGMOD 2011»
12 years 10 months ago
Context-sensitive ranking for document retrieval
We study the problem of context-sensitive ranking for document retrieval, where a context is defined as a sub-collection of documents, and is specified by queries provided by do...
Liang Jeff Chen, Yannis Papakonstantinou
OOPSLA
2010
Springer
13 years 6 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu