Automated Synthesis of Access Control Lists
暂无分享,去创建一个
[1] Xiao Liu,et al. PiE: programming in eliza , 2014, ASE.
[2] Albert G. Greenberg,et al. The cutting EDGE of IP router configuration , 2004, Comput. Commun. Rev..
[3] Sumit Gulwani,et al. Automating string processing in spreadsheets using input-output examples , 2011, POPL '11.
[4] Aarne Ranta,et al. A Multilingual Natural-Language Interface to Regular Expressions , 1998 .
[5] Jozef Janitor,et al. Visual Learning Tools for Teaching/Learning Computer Networks: Cisco Networking Academy and Packet Tracer , 2010, 2010 Sixth International Conference on Networking and Services.
[6] Chris Welsh,et al. GNS3 Network Simulation Guide , 2013 .
[7] Robert W. Shirey,et al. Internet Security Glossary, Version 2 , 2007, RFC.
[8] Yusuf Bhaiji. Network Security Technologies and Solutions , 2008 .
[9] Joseph Weizenbaum,et al. and Machine , 1977 .
[10] William N. Robinson,et al. A Rule-Based Natural Language Technique for Requirements Discovery and Classification in Open-Source Software Development Projects , 2011, 2011 44th Hawaii International Conference on System Sciences.
[11] Alvin Cheung,et al. Synthesizing highly expressive SQL queries from input-output examples , 2017, PLDI.
[12] Xiao Liu,et al. Natural Shell: An Assistant for End-User Scripting , 2016, Int. J. People Oriented Program..
[13] Alexander Aiken,et al. Synthesizing program input grammars , 2016, PLDI.