Sciweavers

16725 search results - page 3046 / 3345
» Engineering Software Correctness
Sort
View
157
Voted
WPES
2003
ACM
15 years 9 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
DRM
2003
Springer
15 years 9 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 9 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
EURODAC
1994
IEEE
211views VHDL» more  EURODAC 1994»
15 years 8 months ago
Advanced simulation and modeling techniques for hardware quality verification of digital systems
synchronisation also play a fundamental role in overall system robustness. ElectroMagnetic Compatibility (EMC) and ElectroMagnetic Interference (EMI) issues also have to be conside...
S. Forno, Stephen Rochel
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 8 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
« Prev « First page 3046 / 3345 Last » Next »