Sciweavers

211 search results - page 19 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
CBSQ
2003
Springer
14 years 22 days ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
CCS
2007
ACM
14 years 1 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
PET
2004
Springer
14 years 26 days ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
INEX
2007
Springer
14 years 1 months ago
Structured Document Retrieval, Multimedia Retrieval, and Entity Ranking Using PF/Tijah
CWI and University of Twente used PF/Tijah, a flexible XML retrieval system, to evaluate structured document retrieval, multimedia retrieval, and entity ranking tasks in the conte...
Theodora Tsikrika, Pavel Serdyukov, Henning Rode, ...
CBSE
2009
Springer
13 years 5 months ago
Towards Dynamic Component Isolation in a Service Oriented Platform
When dealing with dynamic component environments such as the OSGi Service Platform, where components can come from different sources and may be known only during runtime, evaluatin...
Kiev Gama, Didier Donsez