Sciweavers

153 search results - page 19 / 31
» Whither Written Language Evaluation
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Static Detection of Vulnerabilities in x86 Executables
In the last few years, several approaches have been proposed to perform vulnerability analysis of applications written in high-level languages. However, little has been done to au...
Marco Cova, Viktoria Felmetsger, Greg Banks, Giova...
SIGIR
2008
ACM
13 years 7 months ago
Product retrieval for grocery stores
We introduce a grocery retrieval system that maps shopping lists written in natural language into actual products in a grocery store. We have developed the system using nine month...
Petteri Nurmi, Eemil Lagerspetz, Wray L. Buntine, ...
ICTAC
2004
Springer
14 years 22 days ago
A Proof of Weak Termination Providing the Right Way to Terminate
We give an inductive method for proving weak innermost termination of rule-based programs, from which we automatically infer, for each successful proof, a finite strategy for data...
Olivier Fissore, Isabelle Gnaedig, Hél&egra...
COMSWARE
2006
IEEE
14 years 1 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin