11 papers:
- ISSTA-2013-TrippWG #approach #learning #security #testing #web
- Finding your way in the testing jungle: a learning approach to web security testing (OT, OW, LG), pp. 347–357.
- ICFP-2012-Sewell
- Tales from the jungle (PS), pp. 271–272.
- ICMT-2010-WimmerKKRSS
- Surviving the Heterogeneity Jungle with Composite Mapping Operators (MW, GK, AK, WR, JS, WS), pp. 260–275.
- PADL-2008-HirzelNBV #named #pattern matching
- Matchete: Paths through the Pattern Matching Jungle (MH, NN, BB, JV), pp. 150–166.
- VLDB-2005-DittrichSKB #named
- iMeMex: Escapes from the Personal Information Jungle (JPD, MAVS, DK, LB), pp. 1306–1309.
- PLDI-2005-MandelinXBK #api #mining
- Jungloid mining: helping to navigate the API jungle (DM, LX, RB, DK), pp. 48–61.
- QAPL-2004-Tuosto05 #communication #named
- Tarzan: Communicating and Moving in Wireless Jungles (ET), pp. 77–94.
- DAC-2001-SchaumontVKS #configuration management
- A Quick Safari Through the Reconfiguration Jungle (PS, IV, KK, MS), pp. 172–177.
- SIGMOD-1999-BohlenBD #database
- The Jungle Database Search Engine (MHB, LB, CED), pp. 584–586.
- KDD-1997-EngelsLS #data mining #mining
- A Guided Tour through the Data Mining Jungle (RE, GL, RS), pp. 163–166.
- ALP-1988-HoffmannP #evaluation #performance #term rewriting
- Jungle Evaluation for Efficient Term Rewriting (BH, DP), pp. 191–203.