Sciweavers

1815 search results - page 284 / 363
» Making the Business Case for Software Performance Engineerin...
Sort
View
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
14 years 5 days ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
MANSCI
2007
85views more  MANSCI 2007»
13 years 8 months ago
Probability Elicitation, Scoring Rules, and Competition Among Forecasters
Probability forecasters who are rewarded via a proper scoring rule may care not only about the score, but also about their performance relative to other forecasters. We model this...
Kenneth C. Lichtendahl Jr., Robert L. Winkler
FOSSACS
2009
Springer
14 years 3 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
CIKM
2009
Springer
14 years 3 months ago
Expected reciprocal rank for graded relevance
While numerous metrics for information retrieval are available in the case of binary relevance, there is only one commonly used metric for graded relevance, namely the Discounted ...
Olivier Chapelle, Donald Metlzer, Ya Zhang, Pierre...
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
14 years 3 months ago
A multi-objective approach to search-based test data generation
There has been a considerable body of work on search–based test data generation for branch coverage. However, hitherto, there has been no work on multi–objective branch covera...
Kiran Lakhotia, Mark Harman, Phil McMinn