Sciweavers

20511 search results - page 4097 / 4103
» On the level
Sort
View
GI
2003
Springer
14 years 18 days ago
C versus Ada in sicherheitskritischen Applikationen
: In Zukunft wird es verstärkt notwendig sein, sicherheitskritische Systeme statt in Ada in der Programmiersprache C zu implementieren. Die Verwendung von C ist getrieben vom Mang...
Michael Jungmann
ESWS
2009
Springer
14 years 22 hour ago
KiWi - A Platform for Semantic Social Software (Demonstration)
Abstract. Semantic Wikis have demonstrated the power of combining Wikis with Semantic Web technology. The KiWi system goes beyond Semantic Wikis by providing a flexible and adapta...
Sebastian Schaffert, Julia Eder, Szaby Grünwa...
MUC
1992
13 years 11 months ago
GE NLToolset: description of the system as used for MUC-4
The GE NLTooLsET is a set of text interpretation tools designed to be easily adapted to new domains. This report summarizes the system and its performance on the MUG-4 task . INTR...
George B. Krupka, Paul S. Jacobs, Lisa F. Rau, Loi...
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
13 years 11 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
FOCS
2004
IEEE
13 years 11 months ago
Optimal Inapproximability Results for Max-Cut and Other 2-Variable CSPs?
In this paper we show a reduction from the Unique Games problem to the problem of approximating MAX-CUT to within a factor of GW + , for all > 0; here GW .878567 denotes the a...
Subhash Khot, Guy Kindler, Elchanan Mossel, Ryan O...
« Prev « First page 4097 / 4103 Last » Next »