Sciweavers

1129 search results - page 175 / 226
» From programming to modeling: our experience with a distribu...
Sort
View
TDSC
2010
172views more  TDSC 2010»
13 years 3 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
JMLR
2012
11 years 11 months ago
Online Incremental Feature Learning with Denoising Autoencoders
While determining model complexity is an important problem in machine learning, many feature learning algorithms rely on cross-validation to choose an optimal number of features, ...
Guanyu Zhou, Kihyuk Sohn, Honglak Lee
CCS
2007
ACM
14 years 3 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
TACAS
2005
Springer
113views Algorithms» more  TACAS 2005»
14 years 2 months ago
jETI: A Tool for Remote Tool Integration
Abstract. We present jETI, a redesign of the Electronic Tools Integration platform (ETI), that addresses the major issues and concerns accumulated over seven years of experience wi...
Tiziana Margaria, Ralf Nagel, Bernhard Steffen
ICSE
2012
IEEE-ACM
11 years 11 months ago
What make long term contributors: Willingness and opportunity in OSS community
—To survive and succeed, software projects need to attract and retain contributors. We model the individual’s chances to become a valuable contributor through her capacity, wil...
Minghui Zhou, Audris Mockus