-
2
-
-
34548797068
-
On randomization, public information and the curse of dimensionality
-
DOI 10.1109/ICDE.2007.367859, 4221662, 23rd International Conference on Data Engineering, ICDE 2007
-
C. C. Aggarwal. On randomization, public information and the curse of dimensionality. In ICDE, pages 136-145, 2007. (Pubitemid 47422017)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 136-145
-
-
Aggarwal, C.C.1
-
3
-
-
41549109791
-
On static and dynamic methods for condensation-based privacy-preserving data mining
-
March
-
C. C. Aggarwal and P. S. Yu. On static and dynamic methods for condensation-based privacy-preserving data mining. ACM Trans. Database Syst., 33:2:1-2:39, March 2008.
-
(2008)
ACM Trans. Database Syst.
, vol.33
, Issue.2
, pp. 1-2
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
6
-
-
77954465491
-
Robust persistence layers
-
S. Ambler. Robust persistence layers. Softw. Dev., 6(2):73-75, 1998.
-
(1998)
Softw. Dev.
, vol.6
, Issue.2
, pp. 73-75
-
-
Ambler, S.1
-
8
-
-
79952014468
-
Census bureau obscured personal data-too well, some say
-
Feb.
-
C. Bialik. Census bureau obscured personal data - too well, some say. The Wall Street Journal, Feb. 2010.
-
(2010)
The Wall Street Journal
-
-
Bialik, C.1
-
9
-
-
65449147584
-
The cost of privacy: Destruction of data-mining utility in anonymized data publishing
-
J. Brickell and V. Shmatikov. The cost of privacy: destruction of data-mining utility in anonymized data publishing. In KDD, pages 70-78, 2008.
-
(2008)
KDD
, pp. 70-78
-
-
Brickell, J.1
Shmatikov, V.2
-
10
-
-
79959876214
-
B-anonymity: A model for anonymized behaviour-preserving test and debugging data
-
A. Budi, D. Lo, L. Jiang, and Lucia. b-anonymity: a model for anonymized behaviour-preserving test and debugging data. In PLDI, pages 447-457, 2011.
-
(2011)
PLDI
, pp. 447-457
-
-
Budi, A.1
Lo, D.2
Jiang, L.3
Lucia4
-
12
-
-
0016993577
-
A system to generate test data and symbolically execute programs
-
L. A. Clarke. A system to generate test data and symbolically execute programs. IEEE Trans. Softw. Eng., 2(3):215-222, 1976.
-
(1976)
IEEE Trans. Softw. Eng.
, vol.2
, Issue.3
, pp. 215-222
-
-
Clarke, L.A.1
-
13
-
-
85008249099
-
Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
-
J. Clause and A. Orso. Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting. In ISSTA, pages 249-260, 2009.
-
(2009)
ISSTA
, pp. 249-260
-
-
Clause, J.1
Orso, A.2
-
14
-
-
79959882402
-
Camouflage: Automated anonymization of field data
-
J. A. Clause and A. Orso. Camouflage: automated anonymization of field data. In ICSE, pages 21-30, 2011.
-
(2011)
ICSE
, pp. 21-30
-
-
Clause, J.A.1
Orso, A.2
-
15
-
-
70849095741
-
Anonymized data: Generation, models, usage
-
G. Cormode and D. Srivastava. Anonymized data: generation, models, usage. In SIGMOD, pages 1015-1018, 2009.
-
(2009)
SIGMOD
, pp. 1015-1018
-
-
Cormode, G.1
Srivastava, D.2
-
16
-
-
80053192899
-
Datamonitor. Application testing services: Global market forecast model
-
Aug.
-
Datamonitor. Application testing services: global market forecast model. Datamonitor Research Store, Aug. 2007.
-
(2007)
Datamonitor Research Store
-
-
-
18
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
19
-
-
77950913146
-
Measuring risk and utility of anonymized data using information theory
-
J. Domingo-Ferrer and D. Rebollo-Monedero. Measuring risk and utility of anonymized data using information theory. In EDBT/ICDT, pages 126-130, 2009.
-
(2009)
EDBT/ICDT
, pp. 126-130
-
-
Domingo-Ferrer, J.1
Rebollo-Monedero, D.2
-
21
-
-
79956336217
-
Introduction to privacy-preserving data publishing: Concepts and techniques
-
Chapman & Hall/CRC, August
-
B. C. M. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Data Mining and Knowledge Discovery. Chapman & Hall/CRC, August 2010.
-
(2010)
Data Mining and Knowledge Discovery
-
-
Fung, B.C.M.1
Wang, K.2
Fu, A.W.-C.3
Yu, P.S.4
-
22
-
-
34548273557
-
Compositional dynamic test generation
-
P. Godefroid. Compositional dynamic test generation. In POPL, pages 47-54, 2007.
-
(2007)
POPL
, pp. 47-54
-
-
Godefroid, P.1
-
23
-
-
79952026752
-
Is data privacy always good for software testing?
-
M. Grechanik, C. Csallner, C. Fu, and Q. Xie. Is data privacy always good for software testing? In ISSRE, pages 368-377, 2010.
-
(2010)
ISSRE
, pp. 368-377
-
-
Grechanik, M.1
Csallner, C.2
Fu, C.3
Xie, Q.4
-
24
-
-
78149234458
-
An empirical investigation into a large-scale Java open source code repository
-
pages 11:1-11:10
-
M. Grechanik, C. McMillan, L. DeFerrari, M. Comi, S. Crespi, D. Poshyvanyk, C. Fu, Q. Xie, and C. Ghezzi. An empirical investigation into a large-scale Java open source code repository. In ESEM, pages 11:1-11:10, 2010.
-
(2010)
ESEM
-
-
Grechanik, M.1
McMillan, C.2
Deferrari, L.3
Comi, M.4
Crespi, S.5
Poshyvanyk, D.6
Fu, C.7
Xie, Q.8
Ghezzi, C.9
-
25
-
-
77956297665
-
-
McGraw-Hill, Inc. New York, NY, USA, 1 edition
-
C. Jones. Software Engineering Best Practices. McGraw-Hill, Inc., New York, NY, USA, 1 edition, 2010.
-
(2010)
Software Engineering Best Practices
-
-
Jones, C.1
-
26
-
-
1542286887
-
A family of test adequacy criteria for database-driven applications
-
G. M. Kapfhammer and M. L. Soffa. A family of test adequacy criteria for database-driven applications. In ESEC/FSE, pages 98-107, 2003.
-
(2003)
ESEC/FSE
, pp. 98-107
-
-
Kapfhammer, G.M.1
Soffa, M.L.2
-
27
-
-
0027029758
-
Undecidability of static analysis
-
W. Landi. Undecidability of static analysis. ACM Lett. Program. Lang. Syst., 1(4):323-337, 1992.
-
(1992)
ACM Lett. Program. Lang. Syst.
, vol.1
, Issue.4
, pp. 323-337
-
-
Landi, W.1
-
28
-
-
70350634219
-
On the tradeoff between privacy and utility in data publishing
-
T. Li and N. Li. On the tradeoff between privacy and utility in data publishing. In KDD, pages 517-526, 2009.
-
(2009)
KDD
, pp. 517-526
-
-
Li, T.1
Li, N.2
-
29
-
-
34548738230
-
Hybrid concolic testing
-
R. Majumdar and K. Sen. Hybrid concolic testing. In ICSE, pages 416-426, 2007.
-
(2007)
ICSE
, pp. 416-426
-
-
Majumdar, R.1
Sen, K.2
-
31
-
-
67650289929
-
Maximizing privacy under data distortion constraints in noise perturbation methods
-
Y. Rachlin, K. Probst, and R. Ghani. Maximizing privacy under data distortion constraints in noise perturbation methods. In PinKDD, pages 92-110, 2008.
-
(2008)
PinKDD
, pp. 92-110
-
-
Rachlin, Y.1
Probst, K.2
Ghani, R.3
-
32
-
-
0021389555
-
Practical data-swapping: The first steps
-
March
-
S. P. Reiss. Practical data-swapping: the first steps. ACM Trans. Database Syst., 9:20-37, March 1984.
-
(1984)
ACM Trans. Database Syst.
, vol.9
, pp. 20-37
-
-
Reiss, S.P.1
-
33
-
-
84987978538
-
Non-reversible privacy transformations
-
S. P. Reiss, M. J. Post, and T. Dalenius. Non-reversible privacy transformations. In PODS, pages 139-146, 1982.
-
(1982)
PODS
, pp. 139-146
-
-
Reiss, S.P.1
Post, M.J.2
Dalenius, T.3
-
34
-
-
0035517699
-
Protecting respondents'identities in microdata release
-
P. Samarati. Protecting respondents'identities in microdata release. IEEE Trans. Knowl. Data Eng., 13(6):1010-1027, 2001.
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
37
-
-
78649768390
-
MODA: Automated test generation for database applications via mock objects
-
K. Taneja, Y. Zhang, and T. Xie. MODA: Automated test generation for database applications via mock objects. In ASE, pages 289-292, 2010.
-
(2010)
ASE
, pp. 289-292
-
-
Taneja, K.1
Zhang, Y.2
Xie, T.3
-
39
-
-
84857550008
-
Regression testing minimisation, selection and prioritisation: A survey
-
S. Yoo and M. Harman. Regression testing minimisation, selection and prioritisation: A survey. STVR, to appear, 2011.
-
(2011)
STVR
-
-
Yoo, S.1
Harman, M.2
|