Sciweavers

2210 search results - page 414 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
MSR
2010
ACM
13 years 10 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
KYOTODL
2000
122views more  KYOTODL 2000»
13 years 10 months ago
Federation Services for Heterogeneous Digital Libraries Accessing Cooperative and Non-Cooperative Sources
Today, bibliographical information is kept in a variety of digital libraries available on the Internet. The integration of bibliographical data is considered as one of the most im...
Martin Endig, Michael Höding, Gunter Saake, K...
IJWIS
2007
181views more  IJWIS 2007»
13 years 8 months ago
Answering queries over incomplete data stream histories
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
PVM
2010
Springer
13 years 7 months ago
Toward Performance Models of MPI Implementations for Understanding Application Scaling Issues
Abstract. Designing and tuning parallel applications with MPI, particularly at large scale, requires understanding the performance implications of different choices of algorithms ...
Torsten Hoefler, William Gropp, Rajeev Thakur, Jes...
ICCSA
2007
Springer
14 years 3 months ago
3D Spatial Operations in Geo DBMS Environment for 3D GIS
Next generation of GIS software should be able to manipulate and analyse complex situations of real world phenomena. One of the desired components in such software or system is the...
Chen Tet-Khuan, Alias Abdul-Rahman, Sisi Zlatanova