Sciweavers

107 search results - page 8 / 22
» Taming Selective Strictness
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
WINE
2007
Springer
150views Economy» more  WINE 2007»
14 years 1 months ago
Maximizing Revenue in Sequential Auctions
We study sequential auctions for private value objects and unit-demand bidders using second-price sealed-bid rules. We analyze this scenario from the seller’s perspective and con...
Edith Elkind, S. Shaheen Fatima
MMMACNS
2001
Springer
14 years 4 days ago
On Some Cryptographic Properties of Rijndael
We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES)....
Selçuk Kavut, Melek D. Yücel
WSC
2007
13 years 10 months ago
Determining efficient simulation run lengths for real time decision making
Suppose that there are a number of alternative ways of operating a system, and a performance measure is available for comparing them. Simulation runs can be carried out to estimat...
Russell C. H. Cheng
LREC
2010
163views Education» more  LREC 2010»
13 years 9 months ago
Lexical Resources and Ontological Classifications for the Recognition of Proper Names Sense Extension
Particular uses of PNs with sense extension are focussed on and inspected taking into account the presence of PNs in lexical semantic databases and electronic corpora. Methodology...
Rita Marinelli