Sciweavers

168 search results - page 27 / 34
» Making Applications Persistent at Run-time
Sort
View
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
LREC
2008
104views Education» more  LREC 2008»
13 years 8 months ago
ISOcat: Corralling Data Categories in the Wild
To achieve true interoperability for valuable linguistic resources different levels of variation need to be addressed. ISO Technical Committee 37, Terminology and other language a...
Marc Kemps-Snijders, Menzo Windhouwer, Peter Witte...
CCS
2010
ACM
13 years 7 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
ISVC
2010
Springer
13 years 5 months ago
Attention-Based Target Localization Using Multiple Instance Learning
Abstract. We propose a novel Multiple Instance Learning (MIL) framework to perform target localization from image sequences. The proposed approach consists of a softmax logistic re...
Karthik Sankaranarayanan, James W. Davis
PEPM
2009
ACM
14 years 4 months ago
Self-adjusting computation: (an overview)
Many applications need to respond to incremental modifications to data. Being incremental, such modification often require incremental modifications to the output, making it po...
Umut A. Acar