Filters








190 Hits in 7.2 sec

QuASoQ 2019 : Quantitative Approaches to Software Quality : Proceedings of the 7th International Workshop on Quantitative Approaches to Software Quality, co-located with 26th Asia-Pacific Software Engineering Conference (APSEC 2019), Putrajaya, Malaysia, December 2, 2019

Horst Lichter, Konrad Fögen, Thanwadee Sunetnanta, Toni Anwar, Horst Lichter, Konrad Fögen, Thanwadee Sunetnanta, Toni Anwar
2019 CEUR Workshop Proceedings  
In order to have an interesting and interactive event sharing lots of experience, we organized the workshop presentations applying the author-discussant model.  ...  Therefore, the discussant had to prepare a set of questions and had to know the details of the presented paper.  ...  Most existing JIT-SDP work focuses on improving the prediction performance of the model by improving the model.  ... 
doi:10.18154/rwth-conv-240299 fatcat:kdt2txiyybghrn3hyklotxsrsu

SoK: Automated Software Diversity

Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz
2014 2014 IEEE Symposium on Security and Privacy  
As a result, researchers have proposed multiple approaches to software diversity that vary with respect to threat models, security, performance, and practicality.  ...  In this paper, we systematically study the state-of-the-art in software diversity and highlight fundamental trade-offs between fully automated approaches.  ...  Greg Morrisett, Stephen Crane, and Mark Murphy for their insightful reviews, helpful suggestions, and proofreading.  ... 
doi:10.1109/sp.2014.25 dblp:conf/sp/LarsenHBF14 fatcat:2z54gsh6cbhk3ihyaq4i6he7h4

Protecting the stack with PACed canaries

Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan
2019 Proceedings of the 4th Workshop on System Software for Trusted Execution - SysTEX '19  
Although this separation does not provide a formal model, it highlights differences in both attacks and defenses.  ...  In time, operating systems were forced to adapt and improve their built-in security.  ... 
doi:10.1145/3342559.3365336 dblp:conf/sosp/LiljestrandGNEA19 fatcat:nrvxdisehbau7kd3ojbkuhtxeu

rtGovOps: A Runtime Framework for Governance in Large-Scale Software-Defined IoT Cloud Systems

Stefan Nastic, Michael Vogler, Christian Inzinger, Hong-Linh Truong, Schahram Dustdar
2015 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering  
To illustrate the feasibility of our framework and its practical applicability to implement and execute operational governance processes in large-scale softwaredefined IoT cloud system, we evaluate our  ...  approach using a realworld case study on managing fleets of electric vehicles. 1 http://pcccl.infosys.tuwien.ac.at/ 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering  ...  Golf course managers are mostly interested in vehicle security to prevent misuse and ensure safety on the golf course (e.g., using geofencing features).  ... 
doi:10.1109/mobilecloud.2015.38 dblp:conf/mobilecloud/NasticVITD15 fatcat:p4mnhtoo2bcidlmjm53qqrsqgi

Program

2020 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)  
Therefore, these businesses directors imminently want to realize the connections with consumer motivation, trust, security risk and consumer behavioral intention requirement of consumer's using smart technologies  ...  In the era of cloud computing with security, how to outsource a trained model to the server but preserve the model privacy is a significant problem for decision tree classification (DTC).  ...  Based on this comparison, we propose a method for improving the performance of an application written in Kotlin in Windows JVM with JIT (Just in time) compiler.  ... 
doi:10.1109/icce-taiwan49838.2020.9258230 fatcat:g25vw7mzvradxna2grlzp6kgiq

Predictive Models in Software Engineering: Challenges and Opportunities [article]

Yanming Yang, Xin Xia, David Lo, Tingting Bi, John Grundy, Xiaohu Yang
2020 arXiv   pre-print
There have been a large number of primary studies that apply predictive models and that present well-preformed studies and well-desigeworks in various research domains, including software requirements,  ...  We describe the key models and approaches used, classify the different models, summarize the range of key application areas, and analyze research results.  ...  Research Questions and Motivations RQs Research Question Motivation RQ1 What are the trends in the primary studies on use of predictive models in SE?  ... 
arXiv:2008.03656v1 fatcat:fe7ylphujfbobeo3g5yevniiei

CONDITIONS OF INVESTMENT DECISION-MAKING IN AREA OF RFID TECHNOLOGY

Marzena Jankowska-Mihułowicz, Piotr Jankowski-Mihułowicz
2014 CBU International Conference Proceedings  
The conclusion comprises a synthesis of the article contents—crucial decisive areas that require monitoring and simultaneous estimation (now and in the future) regarding implementation of the electronic  ...  ) being consistent with the EPC requirements.  ...  Acknowledgements This work was supported in part by the Polish National Centre for Research and Development (NCBR) under Grant No.  ... 
doi:10.12955/cbup.v2.446 fatcat:5t3wgh4nrnhxvdwolugixrifw4

Semantic agent-based controls for Service Oriented Architecture (SOA) enabled Intelligent Transportation Systems (ITS)

Shoaib Kamran, Olivier C L Haas
2011 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC)  
Therefore, ITS-based systems dealing with the traffic network infrastructure requires an efficient mapping and modelling strategy in order to simplify the infrastructure planning and design, and improve  ...  The main requirement was to make significant performance improvements (UI and data transmission) without compromising any of the existing features.  ...  Whether this requires a separate class to perform this is debatable.  ... 
doi:10.1109/itsc.2011.6083112 dblp:conf/itsc/KamranH11 fatcat:5mulhguh3jcbhjlxucwderdfou

A presence-based architecture for a gateway to integrate vehicular ad-hoc networks (VANETs), IP multimedia subsystems (IMS) and wireless sensor networks (WSNs)

Mohab Aly, Alejandro Quintero
2013 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)  
Moreover, VANETs are a sub-class of mobile ad-hoc networks; the performance of the communication depends on how better the routing takes place in the network.  ...  Routing of data depends on the routing protocols being used in the network.  ...  To "Prompt Lab" and "LARIM Lab" colleagues who share knowledge, wisdom and joy with me  ... 
doi:10.1109/iwcmc.2013.6583803 dblp:conf/iwcmc/AlyQ13 fatcat:mrz4g44bcnaltattdujqdoak3y

A Lean Six Sigma framework to enhance the competitiveness in selected automotive component manufacturing organisations

Raveen Rathilall, Shalini Singh
2018 South African Journal of Economic and Management Sciences  
Currently, globalisation, economic uncertainty and fluctuating market demands prompt leaders all over the world to improve their operations and to enhance innovations in processes, products and services  ...  Aim: This article investigates the integration of Lean and Six Sigma tools as a unified approach to continuous improvement and develops a Lean Six Sigma framework for selected automotive component manufacturing  ...  He has guided me, protected me and walked this long journey with me along my side every step of the way.  ... 
doi:10.4102/sajems.v21i1.1852 fatcat:2oxgytnxffdivhvyhabxph442u

Local Organizing Committees

2006 2006 13th IEEE International Conference on Electronics, Circuits and Systems  
Models considering other logistic decisions and its relations with economic parameters could be a good research field.  ...  ACKNOWLEDGMENTS The author is grateful to Maria Inês Faé, professor from Federal University of Espírito Santo and great friend, who encouraged him to write about the subject and deepen in researching about  ...  ' motivation and advantage.  ... 
doi:10.1109/icecs.2006.379662 fatcat:556xl3dm5vdfpodzwjmf5qqu6m

Proposing a Supply Chain Collaboration Framework for Synchronous Flow Implementation in the Automotive Industry: A Moroccan Case Study

Imane Ibn El Farouk, Imane Moufad, Youness Frichi, Jabir Arif, Fouad Jawab
2020 Information  
, and barriers and evaluating the collaboration performance.  ...  The objective is to provide the automotive companies with a decision-making tool for selecting strategic suppliers to collaborate with, examining the collaboration context in terms of motivators, drivers  ...  Acknowledgments: The authors would like to thank the participants from the studied companies for their availability, precious time, and valuable contribution.  ... 
doi:10.3390/info11090431 fatcat:45r65sn3rjasrfczzsiuynhlgq

Local Organizing Committees [chapter]

2005 Proceedings of the Twentieth International Cryogenic Engineering Conference (ICEC20)  
Models considering other logistic decisions and its relations with economic parameters could be a good research field.  ...  ACKNOWLEDGMENTS The author is grateful to Maria Inês Faé, professor from Federal University of Espírito Santo and great friend, who encouraged him to write about the subject and deepen in researching about  ...  ' motivation and advantage.  ... 
doi:10.1016/b978-008044559-5/50002-8 fatcat:hgtll22pt5duvguzik5qx6fxwm

Scalable validation of binary lifters

Sandeep Dasgupta, Sushant Dinesh, Deepan Venkatesh, Vikram S. Adve, Christopher W. Fletcher
2020 Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation  
to an intermediate representation (IR) using a binary lifter, and (3) performing various analysis and transformations on the IR pertaining to the specific goals of the decompiler.  ...  This extensive testing paid off, revealing bugs in both the x86-64 reference manual and other existing semantics, which are all acknowledged, and some are fixed.  ...  Consider the code snippet of the HiStar [199] kernel, as shown in Figure 3 .6(a) 17 , in which the KLEE [200] team found a security vulnerability.  ... 
doi:10.1145/3385412.3385964 dblp:conf/pldi/DasguptaDVAF20 fatcat:3khjl5gbmnetjay23fk3sc2ktu

LMS-Verify: abstraction without regret for verified systems programming

Nada Amin, Tiark Rompf
2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages - POPL 2017  
Performance critical software is almost always developed in C, as programmers do not trust high-level languages to deliver the same reliable performance.  ...  This is bad because low-level code in unsafe languages attracts security vulnerabilities and because development is far less productive, with PL advances mostly lost on programmers operating under tight  ...  This research was supported by NSF through awards 1553471 and 1564207, and by the Swiss FNS through award 200021_166154.  ... 
doi:10.1145/3009837.3009867 fatcat:pkp6vnsu7ja2pfqbznp6clva5u
« Previous Showing results 1 — 15 out of 190 results