Sciweavers

889 search results - page 51 / 178
» Analysis of Software Engineering Data Using Computational In...
Sort
View
OSDI
2006
ACM
14 years 9 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
ISPASS
2008
IEEE
14 years 3 months ago
Independent Component Analysis and Evolutionary Algorithms for Building Representative Benchmark Subsets
— This work addresses the problem of building representative subsets of benchmarks from an original large set of benchmarks, using statistical analysis techniques. The subsets sh...
Vassilios N. Christopoulos, David J. Lilja, Paul R...
ACMACE
2005
ACM
13 years 10 months ago
AI middleware as means for improving gameplay
Current commercial AI middleware are still far from being a generic and flexible tool for developing computer games. Also the literature lacks proposals in this field. In this w...
Börje Karlsson, Bruno Feijó
ICSE
2005
IEEE-ACM
14 years 8 months ago
A cross-program investigation of students' perceptions of agile methods
Research was conducted on using agile methods in software engineering education. This paper explores the perceptions of students from five different academic levels of agile pract...
Grigori Melnik, Frank Maurer
EDBTW
2010
Springer
14 years 15 hour ago
The benefits of the interaction between data warehouses and question answering
Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus mak...
Antonio Ferrández, Jesús Peral