Sciweavers

1629 search results - page 230 / 326
» A Study of Malcode-Bearing Documents
Sort
View
DEXAW
2002
IEEE
123views Database» more  DEXAW 2002»
14 years 24 days ago
Putting the World Wide Web into a Data Warehouse: A DWH-Based Approach to Web Analysis
The World Wide Web, due to its sheer size and dynamics, has turned into one of the most fascinating and important data sources for large-scale analysis and investigation, ranging ...
Andreas Rauber, Oliver Witvoet, Andreas Aschenbren...
WCRE
2002
IEEE
14 years 23 days ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
ECMDAFA
2010
Springer
207views Hardware» more  ECMDAFA 2010»
14 years 20 days ago
An Automated Approach to Transform Use Cases into Activity Diagrams
Use cases are commonly used to structure and document requirements while UML activity diagrams are often used to visualize and formalize use cases, for example to support automated...
Tao Yue, Lionel C. Briand, Yvan Labiche
EDCC
2010
Springer
14 years 20 days ago
Software Process Synthesis in Assurance Based Development of Dependable Systems
—Assurance Based Development (ABD) is a novel approach to the synergistic construction of critical software systems and their assurance arguments. In ABD, the need for assurance ...
Patrick J. Graydon, John C. Knight
ESWS
2010
Springer
14 years 20 days ago
Hierarchical Link Analysis for Ranking Web Data
On the Web of Data, entities are often interconnected in a way similar to web documents. Previous works have shown how PageRank can be adapted to achieve entity ranking. In this pa...
Renaud Delbru, Nickolai Toupikov, Michele Catasta,...