Sciweavers

1629 search results - page 221 / 326
» A Study of Malcode-Bearing Documents
Sort
View
ICSM
2007
IEEE
14 years 2 months ago
Applying Interface-Contract Mutation in Regression Testing of Component-Based Software
Regression testing, which plays an important role in software maintenance, usually relies on test adequacy criteria to select and prioritize test cases. However, with the wide use...
Shan-Shan Hou, Lu Zhang, Tao Xie, Hong Mei, Jiasu ...
IEEEARES
2007
IEEE
14 years 2 months ago
Towards Secure E-Elections in Turkey: Requirements and Principles
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...
Orhan Cetinkaya, Deniz Cetinkaya
IV
2007
IEEE
144views Visualization» more  IV 2007»
14 years 2 months ago
Evaluating an InfoVis Technique Using Insight Reports
The evaluation of Information Visualization (InfoVis) techniques can help to identify specific strengths and weaknesses of these methods. The following article describes the resu...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...
AIIA
2007
Springer
14 years 2 months ago
Building Quality-Based Views of the Web
Due to the fast growing of the information available on the Web, the retrieval of relevant content is increasingly hard. The complexity of the task is concerned both with the seman...
Enrico Triolo, Nicola Polettini, Diego Sona, Paolo...
AIRWEB
2007
Springer
14 years 2 months ago
Combating Spam in Tagging Systems
Tagging systems allow users to interactively annotate a pool of shared resources using descriptive tags. As tagging systems are gaining in popularity, they become more susceptible...
Georgia Koutrika, Frans Adjie Effendi, Zoltá...