Sciweavers

18 search results - page 3 / 4
» A Preliminary Evaluation of Software Inspection Tools, with ...
Sort
View
ISBI
2006
IEEE
14 years 8 months ago
An evaluation of three approaches to tetrahedral mesh generation for deformable registration of brain MR images
In this paper we evaluate three conceptually different approaches to mesh generation for deformable Finite Element Method (FEM) registration of Magnetic Resonance (MR) images of b...
Andriy Fedorov, Nikos Chrisochoides, Ron Kikinis, ...
ACSAC
2002
IEEE
14 years 13 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
CSCWD
2008
Springer
13 years 9 months ago
CEBON: Collaborative estimation based on negotiation
: The Software Engineering community has been trying to get fast and accurate software estimations for many years. Most of the proposed methods require historical information and/o...
Fabian Poblete, José A. Pino, Sergio F. Och...
MSR
2006
ACM
14 years 1 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
ICSE
2005
IEEE-ACM
14 years 7 months ago
Helping users avoid bugs in GUI applications
In this paper, we propose a method to help users avoid bugs in GUI applications. In particular, users would use the application normally and report bugs that they encounter to pre...
Amir Michail, Tao Xie