Search For:

Displaying 1-50 out of 50 total
Inculcating invariants in introductory courses
Found in: Software Engineering, International Conference on
By Michael Peck, David Evans
Issue Date:May 2006
pp. 673-678
One goal of introductory software engineering courses is to motivate and instill good software engineering habits. Unfortunately, practical constraints on typical courses often lead to student experiences that are antithetical to that goal: instead of work...
 
Observability in Hybrid Multi Agent Recurrent Nets for Natural Language Processing
Found in: Hybrid Intelligent Systems, International Conference on
By David Al-Dabass, David Evans, Manling Ren
Issue Date:December 2005
pp. 506-508
Reading a sequence of lexical items in a sentence is equivalent to providing progressively more data at the input to a Kalman observer. The observer architecture includes a model of the lexical/syntactical sequence generator, with state and output variable...
 
A New Hybrid Methodology for Intelligent Chinese Character Recognition
Found in: Hybrid Intelligent Systems, International Conference on
By David Al-Dabass, David Evans, Manling Ren
Issue Date:December 2004
pp. 104-109
A new methodology is proposed to combine fuzzy possibilistic reasoning with knowledge mining of syntax dynamics using hybrid recurrent nets. The structure of Chinese characters consist of a 3-layer hierarchy of character, radical and stroke. Fuzzy possibil...
 
Improving Security Using Extensible Lightweight Static Analysis
Found in: IEEE Software
By David Evans, David Larochelle
Issue Date:January 2002
pp. 42-51
<p>Most security attacks exploit in-stances of well-known classes of implementation flaws. Developers could detect and eliminate many of these flaws before deploying the software, yet these problems persist with disturbing frequency-not be-cause the ...
 
Efficient Data Tagging for Managing Privacy in the Internet of Things
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By David Evans,David M. Eyers
Issue Date:November 2012
pp. 244-248
The Internet of Things creates an environment where software systems are influenced and controlled by phenomena in the physical world. The goal is invisible and natural interactions with technology. However, if such systems are to provide a high-quality pe...
 
Efficient Policy Checking across Administrative Domains
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By David Evans, David Eyers
Issue Date:July 2010
pp. 146-153
No summary available.
 
Linking Policies to the Spatial Environment
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By David Evans, David Eyers, Jean Bacon
Issue Date:July 2010
pp. 73-76
No summary available.
 
.NET Security: Lessons Learned and Missed from Java
Found in: Computer Security Applications Conference, Annual
By Nathanael Paul, David Evans
Issue Date:December 2004
pp. 272-281
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweight platform for execution of untrusted code inside web pages. More recently, M...
 
Privacy through Noise: A Design Space for Private Identification
Found in: Computer Security Applications Conference, Annual
By Karsten Nohl, David Evans
Issue Date:December 2009
pp. 518-527
To protect privacy in large systems, users should be able to authenticate against a central server without disclosing their identity to others. Private identification protocols based on public key cryptography are computationally expensive and cannot be im...
 
Second International Workshop on Dynamic Analysis (WODA 2004)
Found in: Software Engineering, International Conference on
By David Evans, Raimondas Lencevicius
Issue Date:May 2004
pp. 763
Dynamic analysis techniques reason over program executions and show promise in aiding the development of robust and reliable large-scale systems. It has become increasingly clear that limitations of static analysis can be overcome by integrating static and...
   
Flexible Policy-Directed Code Safety
Found in: Security and Privacy, IEEE Symposium on
By David Evans, Andrew Twyman
Issue Date:May 1999
pp. 0032
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform-independent way. Policies are defined in terms of abstract resource manipula...
 
A Discussion on the Recovery of Data from a Virtual Machine
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Nathaniel James Healey,Olga Angelopoulou,David Evans
Issue Date:September 2013
pp. 603-606
This paper aims to provide an initial point of reference for future research within the field of recovering files from virtual machines. We discuss the current methods of file recovery from a physical machine, we define virtualization, and expand on how vi...
 
A Discussion on the Recovery of Data from a Virtual Machine
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Nathaniel James Healey,Olga Angelopoulou,David Evans
Issue Date:September 2013
pp. 603-606
This paper aims to provide an initial point of reference for future research within the field of recovering files from virtual machines. We discuss the current methods of file recovery from a physical machine, we define virtualization, and expand on how vi...
 
Capacity planning for event-based systems using automated performance predictions
Found in: Automated Software Engineering, International Conference on
By Christoph Rathfelder,Samuel Kounev,David Evans
Issue Date:November 2011
pp. 352-361
Event-based communication is used in different domains including telecommunications, transportation, and business information systems to build scalable distributed systems. The loose coupling of components in such systems makes it easy to vary the deployme...
 
Private Editing Using Untrusted Cloud Services
Found in: Distributed Computing Systems Workshops, International Conference on
By Yan Huang, David Evans
Issue Date:June 2011
pp. 263-272
We present a general methodology for protecting the confidentiality and integrity of user data for a class of on-line editing applications. The key insight is that many of these applications are designed to perform most of their data-dependent computation ...
 
Guest Editors' Introduction: The Science of Security
Found in: IEEE Security and Privacy
By David Evans, Sal Stolfo
Issue Date:May 2011
pp. 16-17
We're a long way from establishing a science of security comparable to the traditional physical sciences, and even from knowing whether such a goal is even achievable. Nevertheless, the articles in this special issue hint at the possibility and promise of ...
 
Measuring Security
Found in: IEEE Security and Privacy
By Sal Stolfo, Steven M. Bellovin, David Evans
Issue Date:May 2011
pp. 60-65
To become a legitimate science, computer security requires metrics. However, metrics are the one thing most lacking in our current understanding of computer security. Computer security metrics can be based on computational complexity or on economic or biol...
 
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
Found in: Computational Science and Engineering, IEEE International Conference on
By David Evans, Robert H. Warren
Issue Date:August 2009
pp. 133-138
Modern consumerwireless devices are increasingly powerful, making them attractive touse as wireless sensor nodes. At the same time, many use protocolsuites such as Bluetooth which require devices to reveal data that maymake for unique device identifiers. T...
 
Housekeeping Telemetry Compression: When, How and Why Bother?
Found in: Advances in Satellite and Space Communications, International Conference on
By José-Antonio Martínez-Heras, David Evans, Rainer Timm
Issue Date:July 2009
pp. 35-40
Compression of science data for space missions is an established technique whereas data compression of housekeeping telemetry is rare. This paper questions this state of affairs and we investigate the potential advantages and disadvantages of the latter. U...
 
Data-Fusion Techniques and Its Application
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Hairong Dong, David Evans
Issue Date:August 2007
pp. 442-445
This paper mainly describes the data-fusion techniques combining the data from two independent sensor systems with the aim of improving overall system performance. The data-fusion algorithms that form the core of the system are described in detail, togethe...
 
Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By David Evans, Alastair R. Beresford, Trevor Burbridge, Andrea Soppera
Issue Date:March 2007
pp. 395-400
This paper outlines why context-aware transport applications necessarily record information about people and describes how we can use anonymity techniques to minimise the resulting invasion of privacy. In particular we: (i) describe how to generate unlinka...
 
Perracotta: mining temporal API rules from imperfect traces
Found in: Software Engineering, International Conference on
By Deepali Bhardwaj, Manuvir Das, David Evans, Thirumalesh Bhat, Jinlin Yang
Issue Date:May 2006
pp. 282-291
Dynamic inference techniques have been demonstrated to provide useful support for various software engineering tasks including bug finding, test suite evaluation and improvement, and specification generation. To date, however, dynamic inference has only be...
 
Automatically Inferring Temporal Properties for Program Evolution
Found in: Software Reliability Engineering, International Symposium on
By Jinlin Yang, David Evans
Issue Date:November 2004
pp. 340-351
It is important that program maintainers understand important properties of the programs they modify and ensure that the changes they make do not alter essential properties in unintended ways. Manually documenting those properties, especially temporal ones...
 
Mining the Web to Create a Language Model for Mapping between English Names and Phrases and Japanese
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Gregory Grefenstette, Yan Qu, David A. Evans
Issue Date:September 2004
pp. 110-116
The Web provides the largest, exploitable collection of language use. If we can mine the Web to build abstract models of language use, these models may have many applications. Here we present one example of using the implicit intelligence of language use t...
 
Election Security: Perception and Reality
Found in: IEEE Security and Privacy
By David Evans, Nathanael Paul
Issue Date:January 2004
pp. 24-31
<p>Voters' trust in elections comes from a combination of the mechanisms and procedures we use to record and tally votes, and from confidence in election officials' competence and honesty. Electronic voting systems pose considerable risks to both the...
 
Secure Aggregation for Wireless Networks
Found in: Applications and the Internet Workshops, IEEE/IPSJ International Symposium on
By Lingxuan Hu, David Evans
Issue Date:January 2003
pp. 384
An emerging class of important applications uses ad hoc wireless networks of low-power sensor devices to monitor and send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power, intermedi...
 
Poster: Converging runtime and historic detection of areas of congestion within an urban bus network
Found in: Proceedings of the 7th ACM international conference on Distributed event-based systems (DEBS '13)
By David Evans, David Eyers
Issue Date:June 2013
pp. 345-346
The event calculus (EC) has been used previously to model the behaviour of individual buses in a public transport system. Using this for usefully answering questions about traffic conditions means getting high performance from the backward chaining behavio...
     
Melding security metadata between software and hardware
Found in: Proceedings of the Posters and Demo Track (Middleware '12)
By David Evans, David Eyers
Issue Date:December 2012
pp. 1-2
Best practice for large-scale access control systems involves clear separation of security policy from application-specific functionality. Furthermore, policies should be abstracted away from the enforcement mechanisms used. Recent developments in hardware...
     
A model of information flow control to determine whether malfunctions cause the privacy invasion
Found in: Proceedings of the First Workshop on Measurement, Privacy, and Mobility (MPM '12)
By David M. Eyers, David Evans, Jean Bacon
Issue Date:April 2012
pp. 1-6
Privacy is difficult to assure in complex systems that collect, process, and store data about individuals. The problem is particularly acute when data arise from sensing physical phenomena as individuals are unlikely to realise that actions such as walking...
     
Deontic logic for modelling data flow and use compliance
Found in: Proceedings of the 6th international workshop on Middleware for pervasive and ad-hoc computing (MPAC '08)
By David Evans, David M. Eyers
Issue Date:December 2008
pp. 19-24
We advocate using deontic logic and its representation in the Event Calculus to control access to information in a distributed ubiquitous system. Contracts between information owners are encoded in terms of classes of organisations, data, and interactions....
     
Towards effective strategies for monolingual and bilingual information retrieval: Lessons learned from NTCIR-4
Found in: ACM Transactions on Asian Language Information Processing (TALIP)
By Daisuke Noda, David A. Evans, David A. Hull, Gregory Grefenstette, Hiroshi Matsuda, Kousaku Arita, Motoko Ishikawa, Setsuko Nara, Toshiya Ueda, Yan Qu, Yuki Funakoshi
Issue Date:June 2005
pp. 78-110
At the NTCIR-4 workshop, Justsystem Corporation (JSC) and Clairvoyance Corporation (CC) collaborated in the cross-language retrieval task (CLIR). Our goal was to evaluate the performance and robustness of our recently developed commercial-grade CLIR system...
     
Vector graphics: from PostScript and Flash to SVG
Found in: Proceedings of the 2001 ACM Symposium on Document engineering (DocEng '01)
By David Brailsford, David Evans, Julius Mong, Steve Probets
Issue Date:November 2001
pp. 135-143
The XML-based specification for Scalable Vector Graphics(SVG), sponsored by the World Wide Web consortium, allows for compact and descriptive vector graphics for the Web.This paper describes a set of three tools for creating SVG, either from first principl...
     
Need for automatically generated narration
Found in: Proceedings of the fifth ACM workshop on Research advances in large digital book repositories and complementary media (BooksOnline '12)
By David A. Evans, John Reichenbach
Issue Date:October 2012
pp. 21-24
This paper argues that the best current text-to-speech (TTS) synthesis systems are approaching the quality necessary to provide effective automated narration of audio books. Currently, nearly all audio books and audio journals are recorded by professional ...
     
Towards middleware-aware integration of event-based communication into the Palladio component model
Found in: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems (DEBS '10)
By Benjamin Klatt, Christoph Rathfelder, David Evans, Samuel Kounev
Issue Date:July 2010
pp. 97-98
The event-based communication paradigm is becoming increasingly ubiquitous as an enabling technology for building loosely-coupled distributed systems. However, the loose coupling of components in such systems makes it hard for developers to predict their p...
     
E-discovery
Found in: Proceeding of the 17th ACM conference on Information and knowledge mining (CIKM '08)
By Chris Buckley, David A. Evans, Jason R. Baron, Robert S. Bauer
Issue Date:October 2008
pp. 1001-1001
It is common practice in the U.S. for courts to require that the parties to a legal case make available to one another all material relevant to the case, including electronically held data and documents. For large corporations, such relevant information ma...
     
The user is not the enemy: fighting malware by tracking user intentions
Found in: Proceedings of the 2008 workshop on New security paradigms (NSPW '08)
By David Evans, Jeffrey Shirley
Issue Date:September 2008
pp. 85-91
Current access control policies provide no mechanisms for incorporating user behavior in access control decisions, even though the way a user interacts with a program often indicates what the user expects that program to do. We develop a new approach to ac...
     
Talking to strangers without taking their candy: isolating proxied content
Found in: Proceedings of the 1st workshop on Social network systems (SocialNets '08)
By Adrienne Felt, David Evans, Pieter Hooimeijer, Westley Weimer
Issue Date:April 2008
pp. 25-30
Social networks have begun supporting external content integration with platforms like OpenSocial and the Facebook API. These platforms let users install third- party applications and are a popular example of a mashup. Content integration is often accompli...
     
Secure and practical defense against code-injection attacks using software dynamic translation
Found in: Proceedings of the 2nd international conference on Virtual execution environments (VEE '06)
By Adrian Filipi, Anh Nguyen-Tuong, Dan Williams, David Evans, Jack W. Davidson, Jason Hiser, John C. Knight, Jonathan Rowanhill, Wei Hu
Issue Date:June 2006
pp. 2-12
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be executed. A theoretically strong approach to defending against any type of co...
     
Inculcating invariants in introductory courses
Found in: Proceeding of the 28th international conference on Software engineering (ICSE '06)
By David Evans, Michael Peck
Issue Date:May 2006
pp. 673-678
One goal of introductory software engineering courses is to motivate and instill good software engineering habits. Unfortunately, practical constraints on typical courses often lead to student experiences that are antithetical to that goal: instead of work...
     
Perracotta: mining temporal API rules from imperfect traces
Found in: Proceeding of the 28th international conference on Software engineering (ICSE '06)
By David Evans, Deepali Bhardwaj, Jinlin Yang, Manuvir Das, Thirumalesh Bhat
Issue Date:May 2006
pp. 282-291
Dynamic inference techniques have been demonstrated to provide useful support for various software engineering tasks including bug finding, test suite evaluation and improvement, and specification generation. To date, however, dynamic inference has only be...
     
Circumstance-based categorization analysis of knowledge management systems for the japanese market
Found in: Proceedings of the Thirteenth ACM conference on Information and knowledge management (CIKM '04)
By David A. Evans, Makoto Sano
Issue Date:November 2004
pp. 507-514
We conducted a survey of thirty of the approximately 1,700 customers of Justsystem Corporation's knowledge-management applications. Our goal was to discover the kinds of functions that customers hoped to address in their next-generation use of knowledge ma...
     
Localization for mobile sensor networks
Found in: Proceedings of the 10th annual international conference on Mobile computing and networking (MobiCom '04)
By David Evans, Lingxuan Hu
Issue Date:September 2004
pp. 45-57
Many sensor network applications require location awareness, but it is often too expensive to include a GPS receiver in a sensor network node. Hence, localization schemes for sensor networks typically use a small number of seed nodes that know their locati...
     
Effect of varying number of documents in blind feedback: analysis of the 2003 NRRC RIA workshop "bf_numdocs" experiment suite
Found in: Proceedings of the 27th annual international conference on Research and development in information retrieval (SIGIR '04)
By David A. Evans, Jamie Callan, Jesse Montgomery, Luo Si
Issue Date:July 2004
pp. 476-477
We present an alternative technique for discovering aggregate usage profiles from Web access logs. The technique is based on clustering information needs inferred from users' browsing paths. Browsing paths are extracted from users' access logs. Information...
     
A biological programming model for self-healing
Found in: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security (SSRS '03)
By David Evans, Selvin George, Steven Marchette
Issue Date:October 2003
pp. 72-81
Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. By adopting properties of biological systems, we hope to design systems that operate adequately even in the presence of catastrophic failures and l...
     
A biologically inspired programming model for self-healing systems
Found in: Proceedings of the first workshop on Self-healing systems (WOSS '02)
By David Evans, Lance Davidson, Selvin George
Issue Date:November 2002
pp. 102-104
There is an increasing need for software systems to be able to adapt to changing conditions of resource variability, component malfunction and malicious intrusion. Such self-healing systems can prove extremely useful in situations where continuous service ...
     
Topic structure modeling
Found in: Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR '02)
By David A. Evans, James G. Shanahan, Victor Sheftel
Issue Date:August 2002
pp. 417-418
In this paper, we present a method based on document probes to quantify and diagnose topic structure, distinguishing topics as monolithic, structured, or diffuse. The method also yields a structure analysis that can be used directly to optimize filter (cla...
     
Exploration of a heuristic approach to threshold learning in adaptive filtering (poster session)
Found in: Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR '00)
By Chengxiang Zhai, David A. Evans, Peter Jansen
Issue Date:July 2000
pp. 360-362
In this paper we examine the learning behavior of a heuristic threshold setting approach to information filtering. In particular, we study how different initial threshold settings and different updating parameter settings affect threshold learning. The res...
     
Static detection of dynamic memory errors
Found in: Proceedings of the ACM SIGPLAN 1996 conference on Programming language design and implementation (PLDI '96)
By David Evans
Issue Date:May 1996
pp. 329-338
Many important classes of bugs result from invalid assumptions about the results of functions and the values of parameters and global variables. Using traditional methods, these bugs cannot be detected efficiently at compile-time, since detailed cross-proc...
     
LCLint: a tool for using specifications to check code
Found in: Proceedings of the 2nd ACM SIGSOFT symposium on Foundations of software engineering (SIGSOFT '94)
By David Evans, James Horning, John Guttag, Yang Meng Tan
Issue Date:December 1994
pp. 100-106
Although many local area networks and operating systems support the use of multicast communications, multicast communications have remained primarily an interesting research tool. However, the growing research interest in multimedia and hypermedia for know...
     
Explorations of NLP for information management (panel): observations from practice in mono- and multi-lingual applications
Found in: Proceedings of the 16th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR '93)
By David A. Evans
Issue Date:June 1993
pp. 224-225
Structured texts (for example dictionaries and user manuals) typically have a heirarchical (tree-like) structure. We describe a query language for retrieving information from collections of hierarchical text. The language is based on a tree pattern matchin...
     
 1