Sciweavers

752 search results - page 65 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
TAP
2008
Springer
93views Hardware» more  TAP 2008»
15 years 3 months ago
Pex-White Box Test Generation for .NET
Pex automatically produces a small test suite with high code coverage for a .NET program. To this end, Pex performs a systematic program analysis (using dynamic symbolic execution,...
Nikolai Tillmann, Jonathan de Halleux
136
Voted
WOSP
2004
ACM
15 years 9 months ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich
122
Voted
EUROSEC
2010
ACM
15 years 8 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
125
Voted
SPEECH
1998
171views more  SPEECH 1998»
15 years 3 months ago
Heteroscedastic discriminant analysis and reduced rank HMMs for improved speech recognition
We present the theory for heteroscedastic discriminant analysis (HDA), a model-based generalization of linear discriminant analysis (LDA) derived in the maximum-likelihood framewo...
Nagendra Kumar, Andreas G. Andreou
135
Voted
CHI
1999
ACM
15 years 7 months ago
Learning and Performing by Exploration: Label Quality Measured by Latent Semantic Analysis
Models of learning and performing by exploration assume that the semantic distance between task descriptions and screen labels controls in part the usersÕ search strategies. Neve...
Rodolfo Soto