• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 905
Next 10 →

Data privacy through optimal k-anonymization

by Roberto J. Bayardo - In ICDE , 2005
"... Data de-identification reconciles the demand for release of data for research purposes and the demand for privacy from individuals. This paper proposes and evaluates an optimization algorithm for the powerful de-identification procedure known as k-anonymization. A k-anonymized dataset has the proper ..."
Abstract - Cited by 344 (3 self) - Add to MetaCart
, and develop data-management strategies to reduce reliance on expensive operations such as sorting. Through experiments on real census data, we show the resulting algorithm can find optimal k-anonymizations under two representative cost measures and a wide range of k. We also show that the algorithm can

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
in symbolic execution and dynamic test generation. Our approach records an actual run of the program under test on a well-formed input, symbolically evaluates the recorded trace, and gathers constraints on inputs capturing how the program uses these. The collected constraints are then negated one by one

Concern Graphs: Finding and Describing Concerns

by Martin P. Robillard, Gail C. Murphy , 2002
"... Many maintenance tasks address concerns, or features, that are not well modularized in the source code comprising a system. Existing approaches available to help software developers locate and manage scattered concerns use a representation based on lines of source code, complicating the analysis of ..."
Abstract - Cited by 209 (14 self) - Add to MetaCart
of that concern to the code base. We have used this tool to find and describe concerns related to software change tasks. We have performed case studies to evaluate the feasibility, usability, and scalability of the approach. Our results indicate that Concern Graphs can be used to document a concern for change

Fitness-Guided Path Exploration in Dynamic Symbolic Execution

by Tao Xie, Nikolai Tillmann, Jonathan Halleux, Wolfram Schulte
"... Dynamic symbolic execution is a structural testing technique that systematically explores feasible paths of the program under test by running the program with different test inputs. Its main goal is to find a set of test inputs that lead to the coverage of particular test targets, e.g., specific sta ..."
Abstract - Cited by 62 (19 self) - Add to MetaCart
Dynamic symbolic execution is a structural testing technique that systematically explores feasible paths of the program under test by running the program with different test inputs. Its main goal is to find a set of test inputs that lead to the coverage of particular test targets, e.g., specific

Emobdiment in attitudes, social perception, and emotion

by Paula M. Niedenthal, Lawrence W. Barsalou, Piotr Winkielman, Silvia Krauth-gruber, Fransois Ric - Personality and Social Psychology Review , 2005
"... Findings in the social psychology literatures on attitudes, social perception, and emo-tion demonstrate that social information processing involves embodiment, where em-bodiment refers both to actual bodily states and to simulations of experience in the brain's modality-specific systems for per ..."
Abstract - Cited by 185 (28 self) - Add to MetaCart
-strations ofsocial embodiment exist, no particularly compelling account ofthem has been offered. We propose that theories ofembodied cognition, such as the Perceptual Symbol Systems (PSS) account (Barsalou, 1999), explain and integrate these find-ings, and that they also suggest exciting new directionsfor research

TO CODE OR NOT TO CODE

by Présentée À La, Faculté Informatique, Et Communications, Section Des, Systèmes De Communication, Du Grade, De Docteur, Ès Sciences, Prof M. Vetterli, Prof B. Rimoldi, Prof R. Gallager, Prof A. Lapidoth, Prof J. Massey, Prof E. Telatar, Prof S. Verdú, Michael Gastpar, Amos Lapidoth, Jim Ma , 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract - Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:

Symbolic Crosschecking of Floating-Point and SIMD Code

by Peter Collingbourne, Cristian Cadar, Paul H. J. Kelly
"... We present an effective technique for crosschecking an IEEE 754 floating-point program and its SIMD-vectorized version, implemented in KLEE-FP, an extension to the KLEE symbolic execution tool that supports symbolic reasoning on the equivalence between floating-point values. The key insight behind o ..."
Abstract - Cited by 20 (3 self) - Add to MetaCart
based on symbolic expression matching augmented with canonicalization rules. Under symbolic execution, we have to verify equivalence along every feasible control-flow path. We reduce the branching factor of this process by aggressively merging conditionals, if-converting branches into select operations

Efficient state merging in symbolic execution

by Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, George Candea - In Proceedings of the ACM SIGPLAN 2012 Conference on Programming Language Design and Implementation (PLDI ’12 , 2012
"... Symbolic execution has proven to be a practical technique for building automated test case generation and bug finding tools. Nevertheless, due to state explosion, these tools still struggle to achieve scalability. Given a program, one way to reduce the number of states that the tools need to explore ..."
Abstract - Cited by 35 (2 self) - Add to MetaCart
Symbolic execution has proven to be a practical technique for building automated test case generation and bug finding tools. Nevertheless, due to state explosion, these tools still struggle to achieve scalability. Given a program, one way to reduce the number of states that the tools need

Symbolic robustness analysis

by Rupak Majumdar, Indranil Saha - In RTSS ’09 , 2009
"... Abstract—A key feature of control systems is robustness, the property that small perturbations in the system inputs cause only small changes in its outputs. Robustness is key to designing systems that work under uncertain or imprecise environments. While continuous control design algorithms can expl ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
vectors which demonstrate the worst-case deviations in outputs for small deviations in inputs. We have implemented our approach on top of the Splat test generation tool and we describe an evaluation of our implementation on two examples of automotive control code. I.

Evaluating Symbolic Execution-based Test Tools

by unknown authors
"... Abstract—In recent years several symbolic execution-based tools have been developed to automatically select relevant test inputs from the source code of the system under test. However, each of these tools has different advantages, and there is no detailed feedback available on the actual capabilitie ..."
Abstract - Add to MetaCart
Abstract—In recent years several symbolic execution-based tools have been developed to automatically select relevant test inputs from the source code of the system under test. However, each of these tools has different advantages, and there is no detailed feedback available on the actual
Next 10 →
Results 1 - 10 of 905
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University