Sciweavers

1629 search results - page 220 / 326
» A Study of Malcode-Bearing Documents
Sort
View
HICSS
2008
IEEE
110views Biometrics» more  HICSS 2008»
14 years 2 months ago
Gathering Experience Knowledge from Iterative Software Development Processes
This paper proposes that experience knowledge would be beneficial for iterative software development. In this paper, experience knowledgebased artifacts have been linked to Extrem...
Jouni Kokkoniemi
ICPADS
2008
IEEE
14 years 2 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
ICST
2008
IEEE
14 years 2 months ago
State-Based Testing of Ajax Web Applications
Ajax supports the development of rich-client Web applications, by providing primitives for the execution of asynchronous requests and for the dynamic update of the page structure ...
Alessandro Marchetto, Paolo Tonella, Filippo Ricca
ADC
2008
Springer
139views Database» more  ADC 2008»
14 years 2 months ago
Computing Structural Similarity of Source XML Schemas against Domain XML Schema
In this paper, we study the problem of measuring structural similarities of large number of source schemas against a single domain schema, which is useful for enhancing the qualit...
Jianxin Li, Chengfei Liu, Jeffrey Xu Yu, Jixue Liu...
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 2 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen