Results 1 - 10
of
133
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
outcome. Avoidance can be passive when subjects increasingly refrain from doing something that is associated with a punisher (don't do it); active avoidance involves increasing an instrumental response that is likely to reduce the impact of a punisher (get away from it). Punishers induce negative
Automatically Detecting Error Handling Bugs Using Error Specifications Automatically Detecting Error Handling Bugs using Error Specifications
, 2016
"... Abstract Incorrect error handling in security-sensitive code often leads to severe security vulnerabilities. Implementing correct error handling is repetitive and tedious especially in languages like C that do not support any exception handling primitives. This makes it very easy for the developers ..."
Abstract
- Add to MetaCart
errors only in a limited number of ways and (ii) most functions have simple and consistent error specifications. This allows us to create a simple oracle that can detect a large class of error handling bugs across a wide range of programs. We evaluated EPEX on 867, 000 lines of C Code from four different
TO CODE OR NOT TO CODE
, 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract
- Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:
Chi-Square Test for Anomaly Detection in XML Documents Using Negative Association Rules
"... Anomaly detection is the double purpose of discovering interesting exceptions and identifying incorrect data in huge amounts of data. Since anomalies are rare events, which violate the frequent relationships among data. Normally anomaly detection builds models of normal behavior and automatically de ..."
Abstract
- Add to MetaCart
detects significant deviations from it. The proposed system detects the anomalies in nested XML documents by independency between data. The negative association rules and the chi-square test for independency are applied on the data and a model of abnormal behavior is built as a signature profile
Rule-based Verification of Network Protocol Implementations using Symbolic Execution
"... Abstract—The secure and correct implementation of network protocols for resource discovery, device configuration and network management is complex and error-prone. Protocol specifications contain ambiguities, leading to implementation flaws and security vulnerabilities in network daemons. Such probl ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
. Such problems are hard to detect because they are often triggered by complex sequences of packets that occur only after prolonged operation. The goal of this work is to find semantic bugs in network daemons. Our approach is to replay a set of input packets that result in high source code coverage of the daemon
Defect Data Analysis Based on Extended Association Rule Mining
"... This paper describes an empirical study to reveal rules associated with defect correction effort. We defined defect correction effort as a quantitative (ratio scale) variable, and extended conventional (nominal scale based) association rule mining to directly handle such quantitative variables. An e ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
,200 defects found in a typical medium-scale, multi-vendor (distance development) information system development project in Japan. Our findings based on extracted rules include: (1)Defects detected in coding/unit testing were easily corrected (less than 7 % of mean effort) when they are related to data output
Detection of structural variants and indels within exome data. Nature methods 9
, 2011
"... We report an algorithm to detect structural variation and indels from 1 base pair to 1 megabase pair within exome sequence datasets. Splitread uses one-end anchored placements to cluster the mappings of subsequences of unanchored ends to identify the size, content and location of variants with good ..."
Abstract
-
Cited by 14 (3 self)
- Add to MetaCart
provides a rich resource to discover potentially impactful SVs and indels associated with disease. The nature of the capture methods, limited size of coding regions, and non-uniform distribution of the reads pose significant computational challenges. As a result, variants greater than 15 bp have rarely
Cultural Biases in Economic Exchange",
, 2004
"... Abstract How much do cultural biases affect economic exchange? We try to answer this question by using the relative trust European citizens have for citizens of other countries. First, we document that this trust is affected not only by objective characteristics of the country being trusted, but al ..."
Abstract
-
Cited by 57 (4 self)
- Add to MetaCart
and for culture is the commonality in the legal systems. We find that citizens from a country trust more citizens from another when the two countries share the same type of legal system (i.e., both have a civil code or both a common law system). But we also find more convincing evidence of the effect of cultural
Automatic program repair with evolutionary computation,”
- Commun. ACM,
, 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract
-
Cited by 34 (5 self)
- Add to MetaCart
Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off
Automatic Partial Loop Summarization in Dynamic Test Generation
- In Proceedings of ISSTA’2011 (ACM SIGSOFT International Symposium on Software Testing and Analysis
, 2011
"... Whitebox fuzzing extends dynamic test generation based on symbolic execution and constraint solving from unit testing to wholeapplication security testing. Unfortunately, input-dependent loops may cause an explosion in the number of constraints to be solved and in the number of execution paths to be ..."
Abstract
-
Cited by 32 (5 self)
- Add to MetaCart
to be explored. In practice, whitebox fuzzers arbitrarily bound the number of constraints and paths due to input-dependent loops, at the risk of missing code and bugs. In this work, we investigate the use of simple loop-guard patternmatching rules to automatically guess an input constraint defining the number
Results 1 - 10
of
133