17 papers:
- SCAM-2015-BlazyRS #obfuscation
- Data tainting and obfuscation: Improving plausibility of incorrect taint (SB, SR, TS), pp. 111–120.
- ESEC-FSE-2015-DharPDR #named #source code #string
- CLOTHO: saving programs from malformed strings and incorrect string-handling (AD, RP, MD, SR), pp. 555–566.
- ESEC-FSE-2013-LiuDZ #composition
- Finding incorrect compositions of atomicity (PL, JD, CZ), pp. 158–168.
- DAC-2012-KirschP #problem
- Incorrect systems: it’s not the problem, it’s the solution (CMK, HP), pp. 913–917.
- ICPR-2012-MurataS #optimisation
- Optimizing a triangular mesh by separately dealing with incorrectness of two patches (KM, YS), pp. 1318–1321.
- HIMI-v1-2011-OhoriSNI #analysis
- Construction of a Model for Discriminating between Electroencephalographic Patterns at the Time of Incorrect Inputs Based on Sensitivity Spectrum Analysis (RO, DS, YN, SI), pp. 618–626.
- PEPM-2010-BoustaniH #java #source code
- Corrective hints for type incorrect generic Java programs (NEB, JH), pp. 5–14.
- CIKM-2008-StroeBNP #approach #approximate #string
- An approximate string matching approach for handling incorrectly typed urls (MS, RB, CN, DP), pp. 1339–1340.
- TAP-2007-RummerS #calculus #java #logic #proving #source code #using
- Proving Programs Incorrect Using a Sequent Calculus for Java Dynamic Logic (PR, MAS), pp. 41–60.
- ITiCSE-WGR-2004-Clear #agile #student
- Students becoming political and “incorrect” through agile methods (TC), pp. 13–15.
- IJCAR-2004-SteelBM #induction #protocol
- Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures (GS, AB, MM), pp. 137–151.
- ICPR-v3-2000-SanchisVJ #performance #recognition #speech #verification #word
- Efficient Use of the Grammar Scale Factor to Classify Incorrect Words in Speech Recognition Verification (AS, EV, VMJ), pp. 3278–3281.
- ICML-1994-Asker
- Improving Accuracy of Incorrect Domain Theories (LA), pp. 19–27.
- ML-1989-WilkinsT #consistency #knowledge base #refinement
- Knowledge Base Refinement as Improving an Incorrect, Inconsistent and Incomplete Domain Theory (DCW, KWT), pp. 332–339.
- ML-1988-Pazzani #learning
- Integrated Learning with Incorrect and Incomplete Theories (MJP), pp. 291–297.
- ICSE-1979-Wertz #source code
- A System to Improve incorrect Programs (HW), pp. 286–293.
- ICALP-1976-Brand #proving #source code
- Proving Programs Incorrect (DB), pp. 201–227.