Sciweavers

2560 search results - page 422 / 512
» Analysis Tool for Honeypot Systems
Sort
View
EDBT
2008
ACM
120views Database» more  EDBT 2008»
16 years 1 months ago
Schema mapping verification: the spicy way
Schema mapping algorithms rely on value correspondences ? i.e., correspondences among semantically related attributes ? to produce complex transformations among data sources. Thes...
Angela Bonifati, Giansalvatore Mecca, Alessandro P...
ICSE
2005
IEEE-ACM
16 years 1 months ago
Helping users avoid bugs in GUI applications
In this paper, we propose a method to help users avoid bugs in GUI applications. In particular, users would use the application normally and report bugs that they encounter to pre...
Amir Michail, Tao Xie
ICSE
2007
IEEE-ACM
16 years 1 months ago
Supporting Heterogeneous Architecture Descriptions in an Extensible Toolset
Many architecture description languages (ADLs) have been proposed to model, analyze, configure, and deploy complex software systems. To face this diversity, extensible ADLs (or AD...
Ali Erdem Özcan, Jean-Bernard Stefani, Matthi...
PEPM
2010
ACM
15 years 10 months ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson
CCS
2009
ACM
15 years 8 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea