Sciweavers

3544 search results - page 513 / 709
» Software Testing
Sort
View
NDSS
2007
IEEE
14 years 5 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
TAPIA
2009
ACM
14 years 3 months ago
Research experiences for undergraduates: autonomic computing research at FIU
According to Computing Research Association, during each year between 2003 and 2007, fewer than 3% of the US’s Ph.D.s graduates in computer science and computer engineering were...
Masoud Milani, Seyed Masoud Sadjadi, Raju Rangaswa...
WWW
2008
ACM
14 years 11 months ago
Integrating the IAC neural network in ontology mapping
Ontology mapping seeks to find semantic correspondences between similar elements of different ontologies. This paper proposes a neural network based approach to search for a globa...
Ming Mao, Yefei Peng, Michael Spring
CC
2009
Springer
132views System Software» more  CC 2009»
14 years 11 months ago
Implementation and Use of Transactional Memory with Dynamic Separation
Abstract. We introduce the design and implementation of dynamic separation (DS) as a programming discipline for using transactional memory. Our approach is based on the programmer ...
Andrew Birrell, Johnson Hsieh, Martín Abadi...
CADE
2006
Springer
14 years 11 months ago
Tree Automata with Equality Constraints Modulo Equational Theories
This paper presents new classes of tree automata combining automata with equality test and automata modulo equational theories. We believe that these classes have a good potential ...
Florent Jacquemard, Laurent Vigneron, Michaël...