Sciweavers

1629 search results - page 230 / 326
» A Study of Malcode-Bearing Documents
Sort
View
DEXAW
2002
IEEE
123views Database» more  DEXAW 2002»
15 years 8 months ago
Putting the World Wide Web into a Data Warehouse: A DWH-Based Approach to Web Analysis
The World Wide Web, due to its sheer size and dynamics, has turned into one of the most fascinating and important data sources for large-scale analysis and investigation, ranging ...
Andreas Rauber, Oliver Witvoet, Andreas Aschenbren...
WCRE
2002
IEEE
15 years 8 months ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
150
Voted
ECMDAFA
2010
Springer
207views Hardware» more  ECMDAFA 2010»
15 years 8 months ago
An Automated Approach to Transform Use Cases into Activity Diagrams
Use cases are commonly used to structure and document requirements while UML activity diagrams are often used to visualize and formalize use cases, for example to support automated...
Tao Yue, Lionel C. Briand, Yvan Labiche
EDCC
2010
Springer
15 years 8 months ago
Software Process Synthesis in Assurance Based Development of Dependable Systems
—Assurance Based Development (ABD) is a novel approach to the synergistic construction of critical software systems and their assurance arguments. In ABD, the need for assurance ...
Patrick J. Graydon, John C. Knight
ESWS
2010
Springer
15 years 8 months ago
Hierarchical Link Analysis for Ranking Web Data
On the Web of Data, entities are often interconnected in a way similar to web documents. Previous works have shown how PageRank can be adapted to achieve entity ranking. In this pa...
Renaud Delbru, Nickolai Toupikov, Michele Catasta,...