Sciweavers

8697 search results - page 1623 / 1740
» An Approach to the Enterprise Integration
Sort
View
ICST
2010
IEEE
13 years 7 months ago
Automated Behavioral Regression Testing
—When a program is modified during software evolution, developers typically run the new version of the program against its existing test suite to validate that the changes made ...
Wei Jin, Alessandro Orso, Tao Xie
TSP
2008
132views more  TSP 2008»
13 years 7 months ago
On Doubly Selective Channel Estimation Using Superimposed Training and Discrete Prolate Spheroidal Sequences
Abstract--Channel estimation and data detection for frequencyselective time-varying channels are considered using superimposed training. We employ a discrete prolate spheroidal bas...
Shuangchi He, Jitendra K. Tugnait
OOPSLA
2010
Springer
13 years 7 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu
RAID
2010
Springer
13 years 7 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
TDSC
2010
218views more  TDSC 2010»
13 years 7 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
« Prev « First page 1623 / 1740 Last » Next »