Sciweavers

SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SEE
2010
Springer
13 years 6 months ago
Development of Role-Play Scenarios for Teaching Responsible Conduct of Research
We describe the development, testing, and formative evaluation of nine role-play scenarios for teaching central topics in the responsible conduct of research to graduate students ...
Bradley J. Brummel, C. K. Gunsalus, Kerri L. Ander...
SEE
2010
Springer
13 years 6 months ago
The Social Nature of Engineering and its Implications for Risk Taking
Making decisions with an, often significant, element of risk seems to be an integral part of many of the projects of the diverse profession of engineering. Whether it be decisions...
Allison Ross, Nafsika Athanassoulis
SEE
2010
Springer
13 years 6 months ago
Can Instruction in Engineering Ethics Change Students' Feelings about Professional Responsibility?
How can a course on engineering ethics affect an undergraduate student’s feelings of responsibility about moral problems? In this study, three groups of students were interviewed...
Golnaz Hashemian, Michael C. Loui
SEE
2010
Springer
13 years 6 months ago
The Potential Dual Use of Online Pharmacies
The technological advances of the 20th century resulted in the creation of
Slawomir Letkiewicz, Andrzej Górski
SEE
2010
Springer
13 years 6 months ago
The Social Construction of Copyright Ethics and Values
Sheila Slaughter, Gary Rhoades