Sciweavers

2419 search results - page 450 / 484
» Modeling Spatio-temporal Network Computations: A Summary of ...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 5 hour ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
IWVF
2001
Springer
14 years 6 days ago
Volume and Surface Area Distributions of Cracks in Concrete
Volumetric images of small mortar samples under load are acquired by X-ray microtomography. The images are binarized at many different threshold values, and over a million connecte...
George Nagy, Tong Zhang, W. R. Franklin, Eric Land...
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
14 years 16 hour ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...

Publication
172views
14 years 9 months ago
The Spatial Patterns Affecting Home to Work Distances of Two-Worker Households
Round-trips between home and work represent, for the majority of people, most of their daily commuting time; also, setting home and work places involves more constraints for two- ...
Surprenant-Legault, J and El-Geneidy A.
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 8 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel