Cloud is gaining momentum but its true potential is hampered by the security concerns it has raised. Having vulnerable virtual machines in a virtualized environment is one such concern. Vulnerable virtual machines are...
详细信息
It is widely accepted that modeling in softwareengineering increases productivity and results in better code quality. Yet, modeling adoption remains low. the open source community, in particular, remains almost entir...
详细信息
the two ongoing repositories of software projects in the softwareengineering community are the ISBSG (internationalsoftware Benchmarking Standards Group) Repository and promise (Predictor models In software Engineer...
详细信息
the two ongoing repositories of software projects in the softwareengineering community are the ISBSG (internationalsoftware Benchmarking Standards Group) Repository and promise (Predictor models In softwareengineering). these repositories lack structured documentation and a researcher interested in using the datasets has to conduct his own investigation to identify the datasets that are suitable for his purposes. this paper provides additional information on these datasets by identifying the topics addressed, highlighting the availability of the data file and of the description of attributes related to the datasets, and indicating their usefulness for benchmarking studies.
this work presents a formal specification and an implementation of an erase block management layer and a formal model of the flash driver interface. It is part of our effort to construct a verified file system for fla...
详细信息
Object tracking is a challenging problem in computer vision community. It is very difficult to solve it efficiently due to the appearance or motion changes of the object, such as pose, occlusion, or illumination. Exis...
详细信息
We propose a generic mediated encryption (GME) system that converts any identity based encryption (IBE) to a mediated IBE. this system is based on enveloping an IBE encrypted message using a user9;s identity into a...
详细信息
ISBN:
(纸本)9783319042831;9783319042824
We propose a generic mediated encryption (GME) system that converts any identity based encryption (IBE) to a mediated IBE. this system is based on enveloping an IBE encrypted message using a user's identity into another IBE envelope, using the identity of a security mediator (SEM) responsible for checking users for revocation. We present two security models based on the role of the adversary whether it is a revoked user or a hacked SEM. We prove that GME is as secure as the SEM's IBE (the envelope) against a revoked user and as secure as the user's IBE (the letter) against a hacked SEM. We also present two instantiations of GME. the first instantiation is based on the Boneh-Franklin (BF) FullIBE system, which is a pairing-based encryption system. the second instantiation is based on the Boneh, Gentry and Hamburg (BGH) system, which is a non pairing-based encryption system.
Stepwise regression has often been used for variable selection of effort estimation models. However it has been criticized for inappropriate selection, and another method is recommended. We thus examined the effects o...
详细信息
Stepwise regression has often been used for variable selection of effort estimation models. However it has been criticized for inappropriate selection, and another method is recommended. We thus examined the effects of Lasso, which is one of such variable selection methods. An experiment with datasets from promise repository revealed that Lasso-based selection stably selected better variables than stepwise in predictive performance. We thus concluded Lasso-based selection is preferable to stepwise regression.
Logistic regression is a classical classification method, it has been used widely in many applications which have binary dependent variable. However, when the data sets are imbalanced, the probability of rare event is...
详细信息
software and its development generates an inordinate amount of data. Development activities such as check-ins, work items, bug reports, code reviews, and test executions are recorded in software repositories. User int...
ISBN:
(纸本)9781450320160
software and its development generates an inordinate amount of data. Development activities such as check-ins, work items, bug reports, code reviews, and test executions are recorded in software repositories. User interactions that reflect how customers experience software are recorded in telemetry data, run-time traces, and log files and helps to track application and feature usage and expose performance and reliability. software analytics takes this data and turns it into actionable insight to better inform decisions related to software. To a large extent, software analytics is about what we can learn and share about software. this include our own projects but also projects by others. Looking back at decades of research in empirical softwareengineering and mining software repositories, software analytics lets us share different things: insights, models, methods, and data. In this talk, I will present successful efforts from Microsoft and academia on software analytics and try to convince you that analytics is all about sharing information.
the aim of this paper is mainly to present a way of designing a software application, where the final goal is to discovery new relevant (usually tacit) knowledge. A comparison of standard approach and proposed, proble...
详细信息
the aim of this paper is mainly to present a way of designing a software application, where the final goal is to discovery new relevant (usually tacit) knowledge. A comparison of standard approach and proposed, problem driven design approach is also briefly denoted. the paper defines the need of general criteria that have to be met in the application development process and also components and functions that have to be present in the final deployed application. KDD (knowledge discovery in databases) process has specific steps that are usually omitted or disregarded, when considering application design for particular purposes. the most important factor is that the application has to be in compliance withthe standard knowledge discovery process to ensure best practices, used in solving every KDD problem. As an example we have created a definition of such an application for the Laboratory of Intelligent Control Systems of Jet Engines (LIRS LM).
暂无评论