Sciweavers

12 search results - page 1 / 3
» Checking for k-Anonymity Violation by Views
Sort
View
VLDB
2005
ACM
114views Database» more  VLDB 2005»
13 years 10 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
TACAS
2005
Springer
121views Algorithms» more  TACAS 2005»
13 years 10 months ago
FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs
Abstract. We present the FocusCheck model-checking tool for the verification and easy debugging of assertion violations in sequential C programs. The main functionalities of the t...
Curtis W. Keller, Diptikalyan Saha, Samik Basu, Sc...
CC
2011
Springer
270views System Software» more  CC 2011»
12 years 8 months ago
Subregion Analysis and Bounds Check Elimination for High Level Arrays
For decades, the design and implementation of arrays in programming languages has reflected a natural tension between productivity and performance. Recently introduced HPCS langua...
Mackale Joyner, Zoran Budimlic, Vivek Sarkar
SIGSOFT
2007
ACM
14 years 5 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
ENTCS
2006
123views more  ENTCS 2006»
13 years 4 months ago
Steering of Discrete Event Systems: Control Theory Approach
Runtime verification involves monitoring the system at runtime to check for conformance of the execution trace to user defined safety properties. Typically, run-time verifiers do ...
Arvind Easwaran, Sampath Kannan, Oleg Sokolsky