Sciweavers

116 search results - page 10 / 24
» Is Data Privacy Always Good for Software Testing
Sort
View
CCS
2007
ACM
15 years 9 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
16 years 3 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
OOPSLA
2004
Springer
15 years 8 months ago
Finding bugs is easy
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. Whil...
David Hovemeyer, William Pugh
ESORICS
2010
Springer
15 years 4 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
BMCBI
2005
118views more  BMCBI 2005»
15 years 3 months ago
Feature selection and classification for microarray data analysis: Evolutionary methods for identifying predictive genes
Background: In the clinical context, samples assayed by microarray are often classified by cell line or tumour type and it is of interest to discover a set of genes that can be us...
Thanyaluk Jirapech-Umpai, J. Stuart Aitken