Sciweavers

185 search results - page 37 / 37
» SOFL: A Formal Engineering Methodology for Industrial Applic...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
GECCO
2008
Springer
163views Optimization» more  GECCO 2008»
13 years 8 months ago
Embedded evolutionary multi-objective optimization for worst case robustness
In Multi-Objective Problems (MOPs) involving uncertainty, each solution might be associated with a cluster of performances in the objective space depending on the possible scenari...
Gideon Avigad, Jürgen Branke
WWW
2006
ACM
14 years 8 months ago
Relaxed: on the way towards true validation of compound documents
To maintain interoperability in the Web environment it is necessary to comply with Web standards. Current specifications of HTML and XHTML languages define conformance conditions ...
Jirka Kosek, Petr Nálevka
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
14 years 8 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
ATAL
2005
Springer
14 years 1 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh