Filters








1,031 Hits in 4.3 sec

Demystifying the Threat-Modeling Process

P. Torr
2005 IEEE Security and Privacy  
you in this article), but I couldn't have done it without the prior work of many others.  ...  Having participated in numerous threat-model reviews over the past few years, I've learned a lot of real-life lessons for improving its efficiency and effectiveness (which I have attempted to share with  ...  the email message to exploit coding errors in the parsing logic, leading to arbitrary code execution (elevation of privilege).  ... 
doi:10.1109/msp.2005.119 fatcat:jph3ojvrxfazleuu2ksnlspexm

Demystifying Regular Expression Bugs: A comprehensive study on regular expression bug causes, fixes, and testing [article]

Peipei Wang, Chris Brown, Jamie A. Jennings, Kathryn T. Stolee
2021 arXiv   pre-print
Certain regex bug types (e.g., compile error, performance issues, regex representation) are less likely to include test code changes than others, and 4) the dominant type of test code changes in regex-related  ...  We identify and classify the nature of the regular expression problems, the fixes, and the related changes in the test code.  ...  Acknowledgements This material is based upon work supported by the National Science Foundation under Grant No. 1714699.  ... 
arXiv:2104.09693v1 fatcat:oi3cd3acevbz7b5tpffwglrhom

Adaptation—Genuine and Spurious: Demystifying Adaptation Processes in Relation to Climate Change

Thomas F. Thornton, Nadia Manasfi
2010 Environment and Society  
In climate change discourse and policy, adaptation has become a critical byword and frame of reference.  ...  An implicit assumption in much of the strategizing is the notion that adaptation can be rationally planned, funded, and governed largely through existing frameworks.  ...  Jevons (1865) who noted that improvements in steam engines and the corresponding fall in the price of coal were accompanied by an increase in coal consumption. 3.  ... 
doi:10.3167/ares.2010.010107 fatcat:gnaao6ucjvepjjc4627hgysxmi

Demystifying conscientization

Kevin Lowell Clay
2018
In social justice work, marginalized youth are often positioned as change agents: people whose critical awareness can be harnessed in the service of political transformation.  ...  Political education can resonate with youth in ways that challenge common sense neoliberal frameworks and expose the class structure as functional and reproductive.  ...  In this way, qualitative studies in the political sciences often rely on the kind of qualitative data that can be quantified, ultimately leading to generalizability and the promise of predictive theorizing  ... 
doi:10.7282/t3ng4v2k fatcat:xmnjj27ambhmvhtdub4orqnr5i

Algorithms for the Masses

Robert Sedgewick
2011 2011 Proceedings of the Eighth Workshop on Analytic Algorithmics and Combinatorics (ANALCO)  
data abstraction in support of encapsulation CS in scientific context functions sqrt(), log() libraries I/O, data analysis 1D arrays sound 2D arrays images recursion fractal models  ...  Surely, we can do better Algorithm A is bad. Google should be interested in my new Algorithm B. TCS (in a talk): What's the matter with Algorithm A? RS: It is not optimal.  ... 
doi:10.1137/1.9781611973013.6 dblp:conf/analco/Sedgewick11 fatcat:rok2c6bo6fgo5carfrzcfb32ka

Open up online research

Alexander Halavais
2011 Nature  
That, in turn, might make companies more willing to share their data with science.  ...  The US Library of Congress, which last year acquired the archive of all public tweets made since Twitter began in 2006, announced that it will open up access to the database, although it is not yet clear  ... 
doi:10.1038/480174a pmid:22158224 fatcat:refckjjsozgghcbrn3rblbsba4

Usability of AutoProof: a case study of software verification [article]

Mansur Khazeev, Victor Rivera, Manuel Mazzara, Alexander Tchitchigin
2016 arXiv   pre-print
At the same time, the case study shows the demand for improved documentation and emphasizes the need for improvement in the tool itself and in the Eiffel IDE.  ...  The results show the efficacy of the tool in verifying a real piece of software and automatically discharging nearly two thirds of verification conditions.  ...  ACKNOWLEDGMENTS We would like to thank Innopolis University for logistic and financial support, and the laboratories of Software Engineering (SE) and Service Science and Engineering (SSE) for the intellectual  ... 
arXiv:1605.01663v1 fatcat:2k6sos55s5hw3doivm7khbvypu

Usability of AutoProof: a case study of software verification
Применимость AutoProof: учебный пример верификации ПО

Mansur Khazeev, Victor Rivera, Manuel Mazzara, Alexander Tchitchigin
2016 Proceedings of the Institute for System Programming of RAS  
Tools and techniques for the formal development of software have played a key role on demystifying this belief.  ...  necessity of understanding the mathematical machinery in full detail.  ...  Acknowledgments We would like to thank Innopolis University for logistic and financial support, and the laboratories of Software Engineering (SE) and Service Science and Engineering (SSE) for the intellectual  ... 
doi:10.15514/ispras-2016-28(2)-7 fatcat:xzxxwpz245bq7en2fvwlom7y5e

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch

Lionel Pibre, Jérôme Pasquet, Dino Ienco, Marc Chaumont
2016 IS&T International Symposium on Electronic Imaging Science and Technology  
The results show more than 16% reduction in the classification error with our CNN or FNN. Third, experiments were also performed in a cover-source mismatch setting.  ...  In this paper, we follow-up the study of Qian et al., and show that in the scenario where the steganograph always uses the same embedding key for embedding with the simulator in the different images, due  ...  48.99% (max=49.06%, min=48.92%, variance=0.0000002) what is as bad as RM+EC. 4.Further discussion 4.1.Demystifying the CNN In order to demystify CNN, we already explained that the learning was equivalent  ... 
doi:10.2352/issn.2470-1173.2016.8.mwsf-078 fatcat:vdmmyamd6rdjdkeso6yptwj3au

An Effective Development Environment Setup for System and Application Software

Aleksandar Bulajic, Samuel Sambasivam, Radoslav Stojic
2013 Issues in Informing Science and Information Technology  
Although communications through e-mail messages, chats, and over video conferences can help to share information and quickly clarify issues, they do not guarantee that information, as well as any conclusions  ...  about an effective software development environment where different tools are combined to automate software development tasks, and replace error-prone and time-consuming manual work.  ...  He has conducted extensive research, written for publications, and delivered presentations in Computer Science, data structures, and Mathematics.  ... 
doi:10.28945/1795 fatcat:otckjku7fvgelphbx57ter3t4e

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch [article]

Lionel Pibre, Pasquet Jérôme, Dino Ienco, Marc Chaumont
2018 arXiv   pre-print
The results show more than 16% reduction in the classification error with our CNN or FNN. Third, experiments were also performed in a cover-source mismatch setting.  ...  Second, experiments were carried out in the clairvoyant scenario in order to compare the CNN and FNN to an RM with an EC.  ...  48.99% (max=49.06%, min=48.92%, variance=0.0000002) what is as bad as RM+EC. 4.Further discussion 4.1.Demystifying the CNN In order to demystify CNN, we already explained that the learning was equivalent  ... 
arXiv:1511.04855v2 fatcat:ikxywmpqaze5hbjpmunrs4tf3u

A mobile agent-based advanced service architecture for wireless internet telephony: design, implementation, and evaluation

B. Emako, R.H. Glitho, S. Pierre
2003 IEEE transactions on computers  
MSA messages. simple.  ...  “Hot” updates can potentially cause type-safety errors While Java type soundness is yet to be formally established [19], in practice, Java bytecode verifier prevents type violation errors except for some  ... 
doi:10.1109/tc.2003.1204826 fatcat:pehgxx27r5aobakdoqa5762s3a

Universal access to e-mail: feasibility and societal implications

1996 ChoiceReviews  
In other words, bad apples have easy access.  ...  A study by the National Commission on Libraries and Information Science (NCLIS) released in 1994 found that only 2.7 percent of public libraries were providing the public with direct access to the Internet  ...  The analysis resulting from these interviews is presented in Chapter Five. INTERVIEW PROTOCOL [Start by describing the goals of the project.  ... 
doi:10.5860/choice.33-5151 fatcat:2exkjneldrcmdasvfx3vxgavr4

Universal Access to e‐mail: Feasibility and Societal Implications

Robert H Anderson, Tora K Bikson, Sally Ann Law, Bridger M Mitchell
1997 Educational Media International  
In other words, bad apples have easy access.  ...  A study by the National Commission on Libraries and Information Science (NCLIS) released in 1994 found that only 2.7 percent of public libraries were providing the public with direct access to the Internet  ...  The analysis resulting from these interviews is presented in Chapter Five. INTERVIEW PROTOCOL [Start by describing the goals of the project.  ... 
doi:10.1080/0952398970340208 fatcat:govb6khtmzey7f3ojznadg5qy4

Non-fiction: an unnaturally naturalised concept for collection development

Matthew Kelly
2018 Collection and Curation  
Design/methodology/approach: A range of literature from the fields of information science, philosophy, literary studies and the sociology of knowledge was critically surveyed in order to uncover reasons  ...  Purpose: This paper seeks to problematise the basis of our use of non-fiction as an explanatory category in libraries that have mandates to deliver information to civil society users in order to initiate  ...  emerge from a context of untruths...to make a story too probable...is to turn bad history into bad fiction" (192) .  ... 
doi:10.1108/cc-08-2017-0033 fatcat:b376wzldvzaptb3aef7bjlmqoi
« Previous Showing results 1 — 15 out of 1,031 results