Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailVulnerability Prediction Models: A case study on the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016 (2016, October)

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at ... [more ▼]

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable components, in the context of the Linux Kernel, under different scenarios. To achieve the above-mentioned aims, we mined vulnerabilities reported in the National Vulnerability Database and created a large dataset with all vulnerable components of Linux from 2005 to 2016. Based on this, we then built and evaluated the prediction models. We observe that an approach based on the header files included and on function calls performs best when aiming at future vulnerabilities, while text mining is the best technique when aiming at random instances. We also found that models based on code metrics perform poorly. We show that in the context of the Linux kernel, vulnerability prediction models can be superior to random selection and relatively precise. Thus, we conclude that practitioners have a valuable tool for prioritizing their security inspection efforts. [less ▲]

Detailed reference viewed: 282 (21 UL)
Full Text
See detailVum Lëtzebuerger Musekerlexikon zu enger Lëtzebuerger Museksgeschicht
Sagrillo, Damien UL

Conference given outside the academic context (2017)

Wa mer iwwer eng Lëtzebuerger Museksgeschicht nodenke wëllen, musse mer fir d'éischt iwwer d'Leit schwatzen, déi des Geschicht duerch hiert musikalesch Wierken gepragt hunn. A mengem Virtrag kommen deemno ... [more ▼]

Wa mer iwwer eng Lëtzebuerger Museksgeschicht nodenke wëllen, musse mer fir d'éischt iwwer d'Leit schwatzen, déi des Geschicht duerch hiert musikalesch Wierken gepragt hunn. A mengem Virtrag kommen deemno niewe Musekerperséinlechkeeten an hire Wierker och Tendenzen zur Sprooch, déi mat der Hëllef vun dem Lexikon, den elo virleit, erausgeschafft kënne ginn. Niewe reng musekshistoresche Faite spillen och regionalgeschichtlech motivéiert soziologesch Tendenzen eng Roll. (Konferenz mat extraiten vun Musekstecker) op lëtzebuergesch. [less ▲]

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailvVote: a Verifiable Voting System
Culnane, Chris; Ryan, Peter UL; Schneider, Steve et al

in Jets (2014)

The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a ... [more ▼]

The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a Voter to the idiosyncrasies of elections in the Australian state of Victoria. This technical report includes general background, user experience and details of the cryptographic protocols and human processes. We explain the problems, present solutions, then analyse their security properties and explain how they tie in to other design decisions. We hope this will be an interesting case study on the application of end-to-end verifiable voting protocols to real elections. A preliminary version of this paper appeared as the 10th February 2014 version of "Draft Technical Report for VEC vVote System". This version augments that version with additional message sequence charts. The team involved in developing the vVote design described in this report were: Craig Burton, Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve Schneider and Vanessa Teague. [less ▲]

Detailed reference viewed: 163 (2 UL)
Peer Reviewed
See detailVygotskij in Harlem: The Barbara Taylor School.
Biesta, Gert UL; Miedema, S.

in Jeugd en samenleving : maandblad (1989), 19(9), 547-562

Detailed reference viewed: 27 (0 UL)
See detailVýkon pravomoci Evropské unie v oblasti ochrany přímých zahraničních investic
Lickova, Magdalena UL

Scientific Conference (2015, March 05)

Detailed reference viewed: 51 (23 UL)
See detailVyužít zkušeností, vytvořit vědomosti
Borsig, Agnes; Kriszan, Michael; Sprenger, Birte UL

in Borsig, Agnes; Knappe, Elke; Kriszan, Michael (Eds.) Zprostředkování vědomosti - Využít zkušeností – Podněcování vývoje (2007)

Detailed reference viewed: 31 (1 UL)
See detailV° Cautionnement, Gage, Hypothèque
Cuniberti, Gilles UL

in Menut, B. (Ed.) Le creancier et le recouvrement de sa creance (2003)

Detailed reference viewed: 19 (0 UL)
See detailV° Loi applicable, Immunités, Titres étrangers en France
Cuniberti, Gilles UL

in Crocq, P.; Brenner, C. (Eds.) Lamy Droit de l'execution (2012)

Detailed reference viewed: 16 (0 UL)
See detailV° Mesures conservatoires – Droit international, Habeas Corpus
Cuniberti, Gilles UL

in Cadiet, L. (Ed.) Dictionnaire de la Justice (2004)

Detailed reference viewed: 13 (0 UL)
Full Text
See detailLes vœux sur les oiseaux: Fortune littéraire d’un rite de cour: Usages politiques d’un motif littéraire
Margue, Michel UL

in Gaullier-Bougassas, Catherine (Ed.) Les "Vœux du Paon" de Jacques de Longuyon. Originalité et rayonnement (2011)

Detailed reference viewed: 13 (1 UL)
See detailW wie Wir
Heimböckel, Dieter UL

Article for general public (2012)

Detailed reference viewed: 86 (0 UL)
Full Text
Peer Reviewed
See detailW1,+-interpolation of probability measures on graphs
Hillion, Erwan UL

in Electronic Journal of Probability (2014), 19

We generalize an equation introduced by Benamou and Brenier and characterizing Wasserstein Wp-geodesics for p > 1, from the continuous setting of probability distributions on a Riemannian manifold to the ... [more ▼]

We generalize an equation introduced by Benamou and Brenier and characterizing Wasserstein Wp-geodesics for p > 1, from the continuous setting of probability distributions on a Riemannian manifold to the discrete setting of probability distributions on a general graph. Given an initial and a nal distributions (f_0(x)), (f_1(x)), we prove the existence of a curve (f_t(x)) satisfying this Benamou-Brenier equation. We also show that such a curve can be described as a mixture of binomial distributions with respect to a coupling that is solution of a certain optimization problem. [less ▲]

Detailed reference viewed: 32 (4 UL)
See detailW_(1+\infty) algebras
Schlichenmaier, Martin UL

in Hazewinkel (Ed.) Encycloppedia of Mathematics, Suppl. II (2000)

Detailed reference viewed: 23 (0 UL)
See detailWa(h)re Gefühle? Sozialpädagogische Emotionsarbeit im wohlfahrtsstaatlichen Kontext
Kommission Sozialpädagogik, ; Bauer, Petra; Dörr, Margret et al

Book published by BeltzJuventa (2018)

Detailed reference viewed: 98 (6 UL)
See detailWaar wordt democratie geleerd?
Biesta, Gert UL

in De Winter, M.; Schillemans, Th; Janssens, R. (Eds.) Opvoeding in democratie. (2006)

Detailed reference viewed: 155 (0 UL)
Peer Reviewed
See detailWaardenburg's syndrome patients have mutations in the human homologue of the Pax-3 paired box gene.
Tassabehji, M.; Read, A. P.; Newton, V. E. et al

in Nature (1992), 355(6361), 635-6

Waardenburg's syndrome (WS) is an autosomal dominant combination of deafness and pigmentary disturbances, probably caused by defective function of the embryonic neural crest. We have mapped one gene for ... [more ▼]

Waardenburg's syndrome (WS) is an autosomal dominant combination of deafness and pigmentary disturbances, probably caused by defective function of the embryonic neural crest. We have mapped one gene for WS to the distal part of chromosome 2. On the basis of their homologous chromosomal location, their close linkage to an alkaline phosphatase gene, and their related phenotype, we suggested that WS and the mouse mutant Splotch might be homologous. Splotch is caused by mutation in the mouse Pax-3 gene. This gene is one of a family of eight Pax genes known in mice which are involved in regulating embryonic development; each contains a highly conserved transcription control sequence, the paired box. Here we show that some families with WS have mutations in the human homologue of Pax-3. Mutations in a related gene, Pax-6, which, like Pax-3, has both a paired box and a paired-type homeobox sequence, cause the Small-eye mutation in mice and aniridia in man. Thus mutations in the Pax genes are important causes of human developmental defects. [less ▲]

Detailed reference viewed: 64 (1 UL)
See detailWaat as Dyscalculie?
Schiltz, Christine UL

Conference given outside the academic context (2014)

Detailed reference viewed: 40 (2 UL)
See detailWaat as Dyscalculie?
Schiltz, Christine UL

Conference given outside the academic context (2014)

Detailed reference viewed: 32 (5 UL)
Full Text
Peer Reviewed
See detailWACA: A Hierarchical Weighted Clustering Algorithm optimized for Mobile Hybrid Networks
Brust, Matthias R. UL; Andronache, Adrian UL; Rothkugel, Steffen UL

in Proceedings The Third International Conference on Wireless and Mobile Communications (2007)

Detailed reference viewed: 48 (1 UL)
See detailDas wachsende Risiko, als sonderpädagogisch förderbedürftig klassifiziert zu werden
Powell, Justin J W UL

in Rehberg, Karl-Siegbert (Ed.) Soziale Ungleichheit—Kulturelle Unterschiede. Verhandlungen des 32. Kongresses der DGS (2006)

Detailed reference viewed: 40 (0 UL)