David Carnegie

Results: 214



#Item
81Computer-mediated communication / Computing / Anti-spam techniques / Email spam / Whitelist / Greylisting / Sender Policy Framework / Simple Mail Transfer Protocol / Challenge–response spam filtering / Spam filtering / Spamming / Email

R E : Reliable Email Scott Garriss† , Michael Kaminsky∗ Michael J. Freedman‡◦ , Brad Karp∗∗ , David Mazières◦ , Haifeng Yu∗† † Carnegie Mellon University, ∗ Intel Research Pittsburgh, ‡ New York

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2006-11-02 03:27:54
82Computer-mediated communication / Computing / Anti-spam techniques / Email spam / Whitelist / Greylisting / Sender Policy Framework / Simple Mail Transfer Protocol / Challenge–response spam filtering / Spam filtering / Spamming / Email

R E : Reliable Email Scott Garriss† , Michael Kaminsky∗ Michael J. Freedman‡◦ , Brad Karp∗∗ , David Mazières◦ , Haifeng Yu∗† † Carnegie Mellon University, ∗ Intel Research Pittsburgh, ‡ New York

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2006-03-30 16:59:43
83Educational psychology / Communication design / Information science / Graphic design / Infographics / Entity-relationship model / Diagrams

Depicting Invisible Processes: The Influence of Molecular-Level Diagrams in Chemistry Instruction. Jodi L. Davenport () Katherine McEldoon () David Klahr () Carnegie M

Add to Reading List

Source URL: oli.cmu.edu

Language: English - Date: 2013-08-07 13:16:33
84Software / Android / Filesystem permissions / Component-based software engineering / Computing / Embedded Linux / Smartphones

Modeling and Enhancing Android’s Permission System Elli Fragkaki, Lujo Bauer, Limin Jia, and David Swasey Carnegie Mellon University, Pittsburgh, PA, USA Abstract. Several works have recently shown that Android’s se

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
85Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:32
86Predicate transformer semantics / Program logic / KeY / IP / Function / Algorithm / NP / Symbolic execution / Communications protocol / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
87Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
88Human–robot interaction / Robotics / Academia / Higher education / Robot learning / Navlab / Robotics Institute / Carnegie Mellon University / Carnegie Mellon School of Computer Science

Cognitive Robotics: High-Level Robot Programming Inspired by Cognitive Science David S. Touretzky Ethan Tira-Thompson Computer Science Department

Add to Reading List

Source URL: cs4hs.cs.washington.edu

Language: English - Date: 2007-04-05 15:30:29
89Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
90Predicate transformer semantics / Program logic / KeY / IP / Function / Algorithm / NP / Symbolic execution / Communications protocol / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
UPDATE