Sciweavers

6293 search results - page 1143 / 1259
» Information Flow Testing
Sort
View
ESOP
2001
Springer
14 years 2 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
PROFES
2001
Springer
14 years 2 months ago
Building an Experience Base for Software Engineering: A Report on the First CeBASE eWorkshop
New information is obtained by research and disseminated by papers in conferences and journals. The synthesis of knowledge depends upon social discourse among the experts in a give...
Victor R. Basili
INFOCOM
2000
IEEE
14 years 2 months ago
Topology Discovery in Heterogeneous IP Networks
Abstract— Knowledge of the up-to-date physical topology of an IP network is crucial to a number of critical network management tasks, including reactive and proactive resource ma...
Yuri Breitbart, Minos N. Garofalakis, Cliff Martin...
IUI
2000
ACM
14 years 2 months ago
Learning to recommend from positive evidence
In recent years, many systems and approaches for recommending information, products or other objects have been developed. In these systems, often machine learning methods that nee...
Ingo Schwab, Wolfgang Pohl, Ivan Koychev
SIGUCCS
2000
ACM
14 years 2 months ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
« Prev « First page 1143 / 1259 Last » Next »