Sciweavers

7253 search results - page 1201 / 1451
» Agile Performance Testing
Sort
View
RAID
2010
Springer
13 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
RAID
2010
Springer
13 years 8 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
RE
2010
Springer
13 years 8 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
SIGECOM
2010
ACM
174views ECommerce» more  SIGECOM 2010»
13 years 8 months ago
Aggregation and manipulation in prediction markets: effects of trading mechanism and information distribution
We conduct laboratory experiments on variants of market scoring rule prediction markets, under different information distribution patterns, in order to evaluate the efficiency an...
Lian Jian, Rahul Sami
SUTC
2010
IEEE
13 years 8 months ago
UbiMASS
—Ubiquitous systems build on the vision that great amounts of fixed and mobile microchips and sensors will be integrated in everyday objects. Developing services on basis of sen...
Faruk Bagci, Julian Wolf, Benjamin Satzger, Theo U...
« Prev « First page 1201 / 1451 Last » Next »