Sciweavers

323 search results - page 5 / 65
» Verify Your Runs
Sort
View
ACSAC
2002
IEEE
14 years 13 days ago
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision
Designers are often faced with difficult tradeoffs between easing the user's burden by making security decisions for them and offering features that ensure that users can mak...
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanb...
WSC
2008
13 years 9 months ago
Who's your Tiger? Using simulation to optimize the lineup of the Detroit Tigers offense
As part of an undergraduate engineering class project, a simulation of the Detroit Tigers offense was created to explore potential changes that would increase number of wins. More...
Jared Davis, Barbara Fordyce, James Cicala, Matthe...
CACM
2006
192views more  CACM 2006»
13 years 7 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein
CCS
2010
ACM
13 years 10 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
ICLP
2009
Springer
14 years 8 months ago
Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
Abstract. We present a framework that unifies unit testing and runtime verification (as well as static verification and static debugging). A key contribution of our overall approac...
Edison Mera, Manuel V. Hermenegildo, Pedro L&oacut...