Sciweavers

5962 search results - page 981 / 1193
» Working with Patterns and Code
Sort
View
CCS
2008
ACM
15 years 6 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
AADEBUG
2005
Springer
15 years 6 months ago
Random testing of C calling conventions
In a C compiler, function calls are difficult to implement correctly because they must respect a platform-specific calling convention. But they are governed by a simple invariant...
Christian Lindig
ESEM
2007
ACM
15 years 6 months ago
Mining Software Evolution to Predict Refactoring
Can we predict locations of future refactoring based on the development history? In an empirical study of open source projects we found that attributes of software evolution data ...
Jacek Ratzinger, Thomas Sigmund, Peter Vorburger, ...
CASCON
2007
112views Education» more  CASCON 2007»
15 years 5 months ago
Removing manually generated boilerplate from electronic texts: experiments with project Gutenberg e-books
Collaborative work on unstructured or semistructured documents, such as in literature corpora or source code, often involves agreed upon templates containing metadata. These templ...
Owen Kaser, Daniel Lemire
DBSEC
2007
116views Database» more  DBSEC 2007»
15 years 5 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...