Sciweavers

582 search results - page 44 / 117
» What Will Probably Happen
Sort
View
NORDSEC
2009
Springer
14 years 3 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
WIKIS
2009
ACM
14 years 3 months ago
rv you're dumb: identifying discarded work in Wiki article history
Wiki systems typically display article history as a linear sequence of revisions in chronological order. This representation hides deeper relationships among the revisions, such a...
Michael D. Ekstrand, John Riedl
CEC
2008
IEEE
14 years 3 months ago
A novel co-evolutionary approach to automatic software bug fixing
— Many tasks in Software Engineering are very expensive, and that has led the investigation to how to automate them. In particular, Software Testing can take up to half of the re...
Andrea Arcuri, Xin Yao
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
14 years 3 months ago
Does Visualization Affect Perceptions of Ethically Complex Policy Decisions: An Experimental Study
Visualization as a communication medium is an important factor when considering how individuals are influenced in a decision about a complex policy issue. Age, race and gender may...
Deirdre Hahn, Rick Shangraw, Mark Keith, David H. ...
ICC
2007
IEEE
14 years 3 months ago
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska