Sciweavers

102 search results - page 8 / 21
» Privacy Aware Data Generation for Testing Database Applicati...
Sort
View
DEXAW
2004
IEEE
95views Database» more  DEXAW 2004»
15 years 8 months ago
Simulation Model for Self-Adaptive Applications in Pervasive Computing
In Autonomic Computing, an application needs to be aware of its environment. While the term "environment" is not normally understood as being a physical environment, in ...
Markus C. Huebscher, Julie A. McCann
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 8 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
DBSEC
2008
137views Database» more  DBSEC 2008»
15 years 6 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
OOPSLA
2005
Springer
15 years 10 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 5 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson