Sciweavers

927 search results - page 120 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
SCAM
2006
IEEE
14 years 1 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
PAMI
2012
11 years 10 months ago
A Blur-Robust Descriptor with Applications to Face Recognition
—Understanding the effect of blur is an important problem in unconstrained visual analysis. We address this problem in the context of image-based recognition, by a fusion of imag...
Raghuraman Gopalan, Sima Taheri, Pavan K. Turaga, ...
KBSE
2007
IEEE
14 years 2 months ago
An automated approach to monitoring and diagnosing requirements
Monitoring the satisfaction of software requirements and diagnosing what went wrong in case of failure is a hard problem that has received little attention in the Software and Req...
Yiqiao Wang, Sheila A. McIlraith, Yijun Yu, John M...
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 7 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...
ICFP
2001
ACM
14 years 7 months ago
Recursive Structures for Standard ML
Standard ML is a statically typed programming language that is suited for the construction of both small and large programs. "Programming in the small" is captured by St...
Claudio V. Russo