Sciweavers

63 search results - page 5 / 13
» The Challenge of Assuring Data Trustworthiness
Sort
View
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
ICSE
2011
IEEE-ACM
12 years 11 months ago
Pragmatic prioritization of software quality assurance efforts
A plethora of recent work leverages historical data to help practitioners better prioritize their software quality assurance efforts. However, the adoption of this prior work in p...
Emad Shihab
WMASH
2003
ACM
14 years 23 days ago
End-to-end throughput and delay assurances in multihop wireless hotspots
Next generation Wireless Local Area Networks (WLAN’s) are likely to require multihop wireless connections between mobile nodes and Internet gateways to achieve high data rates f...
Kuang-Ching Wang, Parameswaran Ramanathan
DFT
2004
IEEE
78views VLSI» more  DFT 2004»
13 years 11 months ago
Reliability Modeling and Assurance of Clockless Wave Pipeline
This paper presents theoretical yet practical methodologies to model, assure and optimize the Reliability of Clockless Wave Pipeline. Clockless wave pipeline is a cutting-edge and...
T. Feng, Nohpill Park, Yong-Bin Kim, Fabrizio Lomb...
CCS
2006
ACM
13 years 11 months ago
Data collection with self-enforcing privacy
Consider a pollster who wishes to collect private, sensitive data from a number of distrustful individuals. How might the pollster convince the respondents that it is trustworthy?...
Philippe Golle, Frank McSherry, Ilya Mironov