-
2
-
-
0037709910
-
The Nonstochastic Multiarmed Bandit Problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire. The Nonstochastic Multiarmed Bandit Problem. Journal on Computing, 32(1):48-77, 2002.
-
(2002)
Journal on Computing
, vol.32
, Issue.1
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
3
-
-
0036568025
-
Finite-time Analysis of the Multiarmed Bandit Problem
-
P. Auer, N. Cesa-Bianchi, and F. Paul. Finite-time Analysis of the Multiarmed Bandit Problem. Machine Learning, 47(2-3):235-256, 2002.
-
(2002)
Machine Learning
, vol.47
, Issue.2-3
, pp. 235-256
-
-
Auer, P.1
Cesa-Bianchi, N.2
Paul, F.3
-
6
-
-
34748886784
-
Software testing research: Achievements, challenges, dreams
-
A. Bertolino. Software testing research: Achievements, challenges, dreams. In Future of Software Engineering, pages 85-103, 2007.
-
(2007)
Future of Software Engineering
, pp. 85-103
-
-
Bertolino, A.1
-
9
-
-
84877686628
-
Unleashing Mayhem on Binary Code
-
S. K. Cha, T. Avgerinos, A. Rebert, and D. Brumley. Unleashing Mayhem on Binary Code. In Proceedings of the IEEE Symposium on Security and Privacy, pages 380-394, 2012.
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 380-394
-
-
Cha, S.K.1
Avgerinos, T.2
Rebert, A.3
Brumley, D.4
-
10
-
-
0036041420
-
Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code
-
D. Engler, D. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. In Proceedings of the ACM Symposium on Operating System Principles, pages 57-72, 2001.
-
(2001)
Proceedings of the ACM Symposium on Operating System Principles
, pp. 57-72
-
-
Engler, D.1
Chen, D.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
11
-
-
84857600799
-
SAGE: Whitebox Fuzzing for Security
-
P. Godefroid, M. Y. Levin, and D. Molnar. SAGE: Whitebox Fuzzing for Security. Communications of the ACM, 55(3):40-44, 2012.
-
(2012)
Communications of the ACM
, vol.55
, Issue.3
, pp. 40-44
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.3
-
12
-
-
0022252694
-
Software Reliability Models: Assumptions, Limitations, and Applicability
-
A. L. Goel. Software Reliability Models: Assumptions, Limitations, and Applicability. IEEE Transactions on Software Engineering, 11(12):1411-1423, 1985.
-
(1985)
IEEE Transactions on Software Engineering
, vol.11
, Issue.12
, pp. 1411-1423
-
-
Goel, A.L.1
-
18
-
-
0025557712
-
An Empirical Study of the Reliability of UNIX Utilities
-
B. P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM, 33(12):32-44, 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
20
-
-
34548785574
-
Feedback-Directed Random Test Generation
-
C. Pacheco, S. K. Lahiri, M. D. Ernst, and T. Ball. Feedback-Directed Random Test Generation. In Proceedings of the International Conference on Software Engineering, pages 75-84, 2007.
-
(2007)
Proceedings of the International Conference on Software Engineering
, pp. 75-84
-
-
Pacheco, C.1
Lahiri, S.K.2
Ernst, M.D.3
Ball, T.4
-
21
-
-
85081874807
-
A First Step towards Automated Detection of Buffer Overrun Vulnerabilities
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. In Proceedings of the Network and Distributed Systems Security Symposium, pages 3-17, 2000.
-
(2000)
Proceedings of the Network and Distributed Systems Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
|