Sciweavers

335 search results - page 53 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
JSS
2007
105views more  JSS 2007»
13 years 7 months ago
Composing pattern-based components and verifying correctness
Designing large software systems out of reusable components has become increasingly popular. Although liberal composition of reusable components saves time and expense, many exper...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, S...
EMSOFT
2005
Springer
14 years 1 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
CSMR
2008
IEEE
14 years 1 months ago
How Lisp Systems Look Different
Many reverse engineering approaches have been developed to analyze software systems written in different languages like C/C++ or Java. These approaches typically rely on a meta-mo...
Adrian Dozsa, Tudor Gîrba, Radu Marinescu
CSB
2003
IEEE
150views Bioinformatics» more  CSB 2003»
14 years 23 days ago
Algorithms for Bounded-Error Correlation of High Dimensional Data in Microarray Experiments
The problem of clustering continuous valued data has been well studied in literature. Its application to microarray analysis relies on such algorithms as -means, dimensionality re...
Mehmet Koyutürk, Ananth Grama, Wojciech Szpan...
IWPC
2006
IEEE
14 years 1 months ago
Towards a Client Driven Characterization of Class Hierarchies
Object-oriented legacy systems are hard to maintain because they are hard to understand. One of the main understanding problems is revealed by the so-called ”yo-yo effect” tha...
Petru Florin Mihancea