We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 121-140 of 10,000 results
  1. MatchCom: Stable Matching-Based Software Services Composition in Cloud Computing Environments

    User preferences on throughput, latency, cost, service location, etc. indicate specific requirements when choosing a web service from the cloud...
    Satish Kumar, Renyu Yang, ... Rajkumar Buyya in Web Engineering
    Conference paper 2024
  2. AuthApp – Portable, Reusable Solid App for GDPR-Compliant Access Granting

    The Solid (Social Linked Data) technology family was developed to provide the foundation for Data Sovereignty in the context of web applications. The...
    Andreas Both, Thorsten Kastner, ... Andreas Harth in Web Engineering
    Conference paper 2024
  3. Streamlining Vocabulary Conversion to SKOS: A YAML-Based Approach to Facilitate Participation in the Semantic Web

    Controlled vocabularies, such as classification schemes, glossaries, taxonomies, or thesauri, play an important role in many Web services. One of the...
    Christoph Göpfert, Jan Ingo Haas, ... Martin Gaedke in Web Engineering
    Conference paper 2024
  4. AutoMaster: Differentiable Graph Neural Network Architecture Search for Collaborative Filtering Recommendation

    Graph Neural Networks (GNNs) have been widely applied in Collaborative Filtering (CF) and have demonstrated powerful capabilities in recommender...
    Caihong Mu, Haikun Yu, ... Yi Liu in Web Engineering
    Conference paper 2024
  5. Investigating the Usefulness of Product Reviews Through Bipolar Argumentation Frameworks

    The importance of useful product reviews cannot be overstated, as they not only provide crucial information to potential buyers but also offer...
    Atefeh Keshavarzi Zafarghandi, Ji Qi, ... Davide Ceolin in Web Engineering
    Conference paper 2024
  6. GitHub-Sourced Web API Evolution: A Large-Scale OpenAPI Dataset

    This study presents a dataset curated using a software tool called the crawler, which gathers OpenAPI Specifications (OAS) from GitHub. The crawler...
    Fabio Di Lauro in Web Engineering
    Conference paper 2024
  7. A Prototype Design of LLM-Based Autonomous Web Crowdsensing

    The expanded demands of complex sensing campaigns involving Cyber-Physical-Social spaces have brought forth a multitude of challenges for web...
    Zhengqiu Zhu, Yatai Ji, ... Bin Chen in Web Engineering
    Conference paper 2024
  8. Overview of Serendipity in Recommender Systems

    Has it ever happened to you that services like Spotify, Netflix or YouTube showed you recommendations on the same topic over and over again? This...
    Denis Kotkov in Web Engineering
    Conference paper 2024
  9. Leveraging Digital Trace Data to Investigate and Support Human-Centered Work Processes

    The ongoing digitization of processes in all domains of everyday life driven by IT systems shows great potential for process automation, analysis,...
    Barbara Weber, Amine Abbad-Andaloussi, ... Francesca Zerbato in Evaluation of Novel Approaches to Software Engineering
    Conference paper 2024
  10. Dynamic Data-Flow Analysis with Dacite: Evaluating an Integrated Data-Flow Visualization Approach

    According to different studies, analyzing the data-flow coverage when testing programs is a highly effective approach to ensure software quality....
    Laura Troost, Jonathan Neugebauer, Herbert Kuchen in Evaluation of Novel Approaches to Software Engineering
    Conference paper 2024
  11. Tarallo: Evading Behavioral Malware Detectors in the Problem Space

    Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,...
    Gabriele Digregorio, Salvatore Maccarrone, ... Stefano Zanero in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  12. S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More

    Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various...
    Conference paper 2024
  13. Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study

    Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch...
    Lukas Kree, René Helmke, Eugen Winter in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  14. Impact Analysis of Disruptions on Composite Resources

    This paper examines the impact of disruptions on the ongoing consumption of composite resources assigned to jobs. Composite resources are defined...
    Zakaria Maamar, Amel Benna, Vanilson Burégio in Evaluation of Novel Approaches to Software Engineering
    Conference paper 2024
  15. Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks

    Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent...
    Mohammad Ali Tofighi, Behzad Ousat, ... Amin Kharraz in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  16. Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity

    In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to...
    Arian Soltani, DJeff Kanda Nkashama, ... Froduald Kabanza in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  17. Enhancing Software Defect Prediction: Exploring the Predictive Power of Two Data Flow Metrics

    Data flow coverage criteria find extensive application in software testing, yet scant research exists regarding low-level data flow metrics as...
    Adam Roman, Rafał Brożek, Jarosław Hryszko in Evaluation of Novel Approaches to Software Engineering
    Conference paper 2024
  18. Requirements Elicitation in the Age of AI: A Tool’s Multi-system Journey

    Traditional Requirements Engineering (RE) practices have introduced new tools to elicit and model requirements. Applying these tools to building AI...
    Khlood Ahmad, Chetan Arora, ... Rajesh Vasa in Evaluation of Novel Approaches to Software Engineering
    Conference paper 2024
  19. GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer

    Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant...
    Ruben Mechelinck, Daniel Dorfmeister, ... Stefan Brunthaler in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  20. Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity

    Binary function similarity comparison is essential in a variety of security fields, such as software vulnerability detection and malware analysis,...
    Suguru Horimoto, Keane Lucas, Lujo Bauer in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
Did you find what you were looking for? Share feedback.