Sciweavers

102 search results - page 8 / 21
» Privacy Aware Data Generation for Testing Database Applicati...
Sort
View
96
Voted
DEXAW
2004
IEEE
95views Database» more  DEXAW 2004»
15 years 3 months ago
Simulation Model for Self-Adaptive Applications in Pervasive Computing
In Autonomic Computing, an application needs to be aware of its environment. While the term "environment" is not normally understood as being a physical environment, in ...
Markus C. Huebscher, Julie A. McCann
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 3 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
DBSEC
2008
137views Database» more  DBSEC 2008»
15 years 1 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
OOPSLA
2005
Springer
15 years 5 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 2 days ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson