Sciweavers

1080 search results - page 153 / 216
» Software metrics: roadmap
Sort
View
CCS
2008
ACM
14 years 11 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CCS
2008
ACM
14 years 11 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
DS
1997
117views Database» more  DS 1997»
14 years 11 months ago
Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases
Determining attribute correspondences is a difficult, time-consuming, knowledge-intensive part of database integration. We report on experiences with tools that identified candi...
Chris Clifton, E. Housman, Arnon Rosenthal
SPLC
2007
14 years 11 months ago
A Quality Model for Evaluating Feature Models
This paper presents work in progress to construct a model for guiding and evaluating the quality of featureoriented models, called FMQ. Product line concepts are becoming increasi...
Christer Thörn
SIGIR
2008
ACM
14 years 9 months ago
User preference choices for complex question answering
Question answering systems increasingly need to deal with complex information needs that require more than simple factoid answers. The evaluation of such systems is usually carrie...
Mingfang Wu, Falk Scholer, Andrew Turpin