Sciweavers

661 search results - page 75 / 133
» What Can We Expect from Program Verification
Sort
View
SIGSOFT
2004
ACM
14 years 9 months ago
Scaling regression testing to large software systems
When software is modified, during development and maintenance, it is regression tested to provide confidence that the changes did not introduce unexpected errors and that new feat...
Alessandro Orso, Nanjuan Shi, Mary Jean Harrold
GIS
2007
ACM
14 years 9 months ago
Recognizing cars in aerial imagery to improve orthophotos
The automatic creation of 3D models of urban spaces has become a very active field of research. This has been inspired by recent applications in the location-awareness on the Inte...
Franz Leberl, Horst Bischof, Helmut Grabner, Stefa...
ASIACRYPT
2009
Springer
14 years 5 days ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
KR
2004
Springer
14 years 2 months ago
Evidence and Belief
We discuss the representation of knowledge and of belief from the viewpoint of decision theory. While the Bayesian approach enjoys general-purpose applicability and axiomatic foun...
Itzhak Gilboa, David Schmeidler
WOSS
2004
ACM
14 years 2 months ago
Instrumentation in software dynamic translators for self-managed systems
Self-managed software requires monitoring and code changes to an executing program. One technology that enables such self management is software dynamic translation (SDT), which a...
Naveen Kumar, Jonathan Misurda, Bruce R. Childers,...