Search
Now showing items 231-240 of 377
Experiences in using Reinforcement Learning for Directed Fuzzing
Directed testing is a technique to analyze user-specified target locations in the program. It reduces
the time and effort of developers by excluding irrelevant parts of the program from testing and
focusing on reaching ...
Stochastic approximation with set-valued maps and Markov noise: Theoretical foundations and applications
Stochastic approximation algorithms produce estimates of a desired solution using noisy real world data.
Introduced by Robbins and Monro, in 1951, stochastic approximation techniques have been instrumental in
the asymptotic ...
Structured Regularization Through Convex Relaxations Of Discrete Penalties
Motivation. Empirical risk minimization(ERM) is a popular framework for learning predictive
models from data, which has been used in various domains such as computer vision, text
processing, bioinformatics, neuro-biology, ...
Adaptively Secure Primitives in the Random Oracle Model
Adaptive security embodies one of the strongest notions of security that allows an adversary to corrupt
parties at any point during protocol execution and gain access to its internal state. Since it models reallife
situations ...
Statistical Network Analysis: Community Structure, Fairness Constraints, and Emergent Behavior
Networks or graphs provide mathematical tools for describing and analyzing relational data. They are used in biology to model interactions between proteins, in economics to identify trade alliances among countries, in ...
Typestates and Beyond: Verifying Rich Behavioral Properties Over Complex Programs
Statically verifying behavioral properties of programs is an important research problem. An
efficient solution to this problem will have visible effects over multiple domains, ranging from
program development, program ...
Handling Overloads with Social Consistency
Cloud computing applications have dynamic workloads, and they often observe spikes in the
incoming traffic which might result in system overloads. System overloads are generally handled by
various load balancing techniques ...
A Trusted-Hardware Backed Secure Payments Platform for Android
Digital payments using personal electronic devices have been steadily gaining in popularity for the last few years. While digital payments using smartphones are very convenient, they are also more susceptible to security ...
Optimizing Dense Matrix Computations with PolyMage
Linear algebra computations and other arbitrary affine accesses are ubiquitous in applications
from domains like scientific computing, digital signal processing (DSP), and deep
neural networks. Libraries such as OpenBLAS, ...
Automated Test Generation and Performance Improvement using Dynamic Program Analysis
Software development process consists of various stages like design, implementation, and
testing. Since programmers are considerably involved in these stages, their intuition and
expertise play a vital role in the success ...