Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Many strategies have been proposed to address the problems associated with managing increasingly complex computing systems. IBM's Autonomic Computing (AC) paradigm is one suc...
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...
Abstract — Governing business compliance with regulations, laws, best practices, contracts, and the like is not an easy task, and so far there are only limited software products ...