Sciweavers

30 search results - page 3 / 6
» Security Rules Specification and Analysis Based on Passive T...
Sort
View
NAACL
2001
13 years 10 months ago
Learning Optimal Dialogue Management Rules by Using Reinforcement Learning and Inductive Logic Programming
Developing dialogue systems is a complex process. In particular, designing efficient dialogue management strategies is often difficult as there are no precise guidelines to develo...
Renaud Lecoeuche
SIGSOFT
2007
ACM
14 years 9 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
INFOCOM
2006
IEEE
14 years 2 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
UML
2001
Springer
14 years 29 days ago
A UML-Based Approach to System Testing
System testing is concerned with testing an entire system based on its specifications. In the context of object-oriented, UML development, this means that system test requirements ...
Lionel C. Briand, Yvan Labiche
RE
2008
Springer
13 years 8 months ago
Generating Natural Language specifications from UML class diagrams
Early phases of software development are known to be problematic, difficult to manage and errors occurring during these phases are expensive to correct. Many systems have been deve...
Farid Meziane, Nikos Athanasakis, Sophia Ananiadou