Sciweavers

377 search results - page 67 / 76
» A Case Study based Software Engineering Education using Open...
Sort
View
ASWEC
2006
IEEE
14 years 1 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
BMCBI
2005
86views more  BMCBI 2005»
13 years 7 months ago
WebArray: an online platform for microarray data analysis
Background: Many cutting-edge microarray analysis tools and algorithms, including commonly used limma and affy packages in Bioconductor, need sophisticated knowledge of mathematic...
Xiaoqin Xia, Michael McClelland, Yipeng Wang
ICSM
2008
IEEE
14 years 2 months ago
Understanding the rationale for updating a function's comment
Up-to-date comments are critical for the successful evolution of a software application. When modifying a function, developers may update the comment associated with the function ...
Haroon Malik, Istehad Chowdhury, Hsiao-Ming Tsou, ...
SAC
2010
ACM
14 years 2 months ago
SE-155 DBSA: a device-based software architecture for data mining
In this paper a new architecture for a variety of data mining tasks is introduced. The Device-Based Software Architecture (DBSA) is a highly portable and generic data mining softw...
Janne Kätevä, Perttu Laurinen, Taneli Ra...
ICSM
2007
IEEE
14 years 1 months ago
System-level Usage Dependency Analysis of Object-Oriented Systems
Uncovering, modelling, and understanding architectural level dependencies of software systems is a key task for software maintainers. However, current dependency analysis techniqu...
Xinyi Dong, Michael W. Godfrey