Sciweavers

3272 search results - page 437 / 655
» Privacy in Data Publishing
Sort
View
TSE
2008
91views more  TSE 2008»
15 years 4 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
JSW
2007
124views more  JSW 2007»
15 years 4 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
137
Voted
CCS
2010
ACM
15 years 3 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
123
Voted
GIL
2010
15 years 3 months ago
Model-based Approach to Quantify and Regionalize Peanut Production in the Major Peanut Production Provinces in the People's Repu
: China is the largest peanut producer in the world and peanut therefore an essential economic product earning significant income for China’s farmers. Major provinces for peanut ...
Heike Knörzer, Simone Graeff-Hönninger, ...
130
Voted
OOPSLA
2010
Springer
15 years 3 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...