Sciweavers

31 search results - page 4 / 7
» Assessing vulnerability exploitability risk using software p...
Sort
View
ITBAM
2010
15 years 1 months ago
A Comorbidity Network Approach to Predict Disease Risk
A prediction model that exploits the past medical patient history to determine the risk of individuals to develop future diseases is proposed. The model is generated by using the s...
Francesco Folino, Clara Pizzuti, Maria Ventura
123
Voted
SEAFOOD
2007
Springer
15 years 8 months ago
The Value of Outsourced Software
Outsourcing of work to support software development and services is seen primarily as a transfer of labor to another shore. But intellectual property, as software, is transferred a...
Gio Wiederhold, Amar Gupta, Rajat Mittal, Erich J....
94
Voted
ISESE
2005
IEEE
15 years 8 months ago
The use and usefulness of the ISO/IEC 9126 quality standard
This paper reports an evaluation the utility of ISO/IEC 9126. ISO/IEC 9126 is an international standard intended to ensure the quality of all software-intensive products including...
Hiyam Al-Kilidar, Karl Cox, Barbara Kitchenham
127
Voted
CF
2005
ACM
15 years 4 months ago
Grid result checking
Result checking is the theory and practice of proving that the result of an execution of a program on an input is correct. Result checking has most often been envisioned in the fr...
Cécile Germain-Renaud, Dephine Monnier-Raga...
FOSSACS
2009
Springer
15 years 9 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith