Sciweavers

252 search results - page 24 / 51
» Why Do Upgrades Fail and What Can We Do about It
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
OOPSLA
2005
Springer
14 years 1 months ago
Ercatons and organic programming: say good-bye to planned economy
Organic programming (OP) is our proposed and already emerging programming model which overcomes some of the limitations of current practice in software development in general and ...
Oliver Imbusch, Falk Langhammer, Guido von Walter
NIPS
2008
13 years 9 months ago
A rational model of preference learning and choice prediction by children
Young children demonstrate the ability to make inferences about the preferences of other agents based on their choices. However, there exists no overarching account of what childr...
Christopher G. Lucas, Thomas L. Griffiths, Fei Xu,...
CAV
2010
Springer
153views Hardware» more  CAV 2010»
13 years 11 months ago
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code
This paper discusses the obstacles that stand in the way of doing a good job of machine-code analysis. Compared with analysis of source code, the challenge is to drop all assumptio...
Thomas W. Reps, Junghee Lim, Aditya V. Thakur, Gog...
WSC
2004
13 years 9 months ago
Using Simulated Data in Support of Research on Regression Analysis
Using simulated data to develop and study diagnostic tools for data analysis is very beneficial. The user can gain insight about what happens when assumptions are violated since t...
Christopher Michael Hill, Linda C. Malone