Sciweavers

967 search results - page 135 / 194
» Automated benchmarking and analysis tool
Sort
View
ICSE
2007
IEEE-ACM
15 years 12 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
80
Voted
ICDE
2010
IEEE
183views Database» more  ICDE 2010»
15 years 6 months ago
Estimating the compression fraction of an index using sampling
—Data compression techniques such as null suppression and dictionary compression are commonly used in today’s database systems. In order to effectively leverage compression, it...
Stratos Idreos, Raghav Kaushik, Vivek R. Narasayya...
KBSE
2009
IEEE
15 years 6 months ago
Towards Augmenting Requirements Models with Preferences
—The analysis of stakeholder requirements is a critical aspect of software engineering. A common way of specifying stakeholder requirements is in terms of a hierarchy of goals wh...
Sotirios Liaskos, Sheila A. McIlraith, John Mylopo...
LICS
2009
IEEE
15 years 6 months ago
Clipping: A Semantics-Directed Syntactic Approximation
In this paper we introduce “clipping,” a new method of syntactic approximation which is motivated by and works in conjunction with a sound and decidable denotational model for...
Dan R. Ghica, Adam Bakewell
ICTAI
2008
IEEE
15 years 6 months ago
Classifying Spend Descriptions with Off-the-Shelf Learning Components
Analyzing spend transactions is essential to organizations for understanding their global procurement. Central to this analysis is the automated classification of these transacti...
Saikat Mukherjee, Dmitriy Fradkin, Michael Roth