Sciweavers

3216 search results - page 441 / 644
» Software engineering issues for mobile application developme...
Sort
View
COMPSAC
1998
IEEE
15 years 7 months ago
Tools for the Knowledge Analyst: An Information Superiority Visionary Demonstration
This paper describes the application of a suite of innovative information processing and analytic support tools developed at The MITRE Corporation, in some cases as extensions of ...
Mark T. Maybury
116
Voted
COMPSAC
2004
IEEE
15 years 7 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
FOSSACS
2006
Springer
15 years 7 months ago
Guessing Attacks and the Computational Soundness of Static Equivalence
The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence dep...
Martín Abadi, Mathieu Baudet, Bogdan Warins...
EDBTW
2010
Springer
15 years 6 months ago
Leveraging web streams for contractual situational awareness in operational BI
The capability of correlating streaming web data with internal data in near real time gives enterprises a tremendous competitive advantage by enabling them to be aware of external...
Malú Castellanos, Chetan Gupta, Song Wang, ...
ICSE
2012
IEEE-ACM
13 years 5 months ago
Axis: Automatically fixing atomicity violations through solving control constraints
Abstract—Atomicity, a general correctness criterion in concurrency programs, is often violated in real-world applications. The violations are difficult for developers to fix, m...
Peng Liu, Charles Zhang