Sciweavers

FASE
2010
Springer
14 years 6 months ago
Evaluating Ordering Heuristics for Dynamic Partial-Order Reduction Techniques
Actor programs consist of a number of concurrent objects called actors, which communicate by exchanging messages. Nondeterminism in actors results from the different possible orde...
Steven Lauterburg, Rajesh K. Karmani, Darko Marino...
FASE
2010
Springer
14 years 6 months ago
Why the Virtual Nature of Software Makes It Ideal for Search Based Optimization
This paper1 provides a motivation for the application of search based optimization to Software Engineering, an area that has come to be known as Search Based Software Engineering (...
Mark Harman
FASE
2010
Springer
14 years 6 months ago
Dynamic Resource Scheduling in Disruption-Prone Software Development Environments
Good resource scheduling plays a pivotal role in successful software development projects. However, effective resource scheduling is complicated by such disruptions as requirements...
Junchao Xiao, Leon J. Osterweil, Qing Wang, Mingsh...
ESSOS
2010
Springer
14 years 6 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
EDBTW
2010
Springer
14 years 6 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
EDBTW
2010
Springer
14 years 6 months ago
Ontology-based news recommendation
Wouter IJntema, Frank Goossen, Flavius Frasincar, ...
EDBTW
2010
Springer
14 years 6 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
EDBTW
2010
Springer
14 years 6 months ago
Analysis of social networking privacy policies
As the use of social networks becomes more widespread and commonplace, users are beginning to question how their privacy is protected by social networks. In this paper, we review ...
Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Ba...
EDBTW
2010
Springer
14 years 6 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
EDBTW
2010
Springer
14 years 6 months ago
Biochemical network matching and composition
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
Martin Hugh Goodfellow, John Wilson, Ela Hunt