Sciweavers

123 search results - page 22 / 25
» Business Rule Extraction from Legacy Code
Sort
View
ICDE
2000
IEEE
99views Database» more  ICDE 2000»
14 years 9 months ago
XWRAP: An XML-Enabled Wrapper Construction System for Web Information Sources
This paper describes the methodology and the software development of XWRAP, an XML-enabled wrapper construction system for semi-automatic generation of wrapper programs. By XML-ena...
Ling Liu, Calton Pu, Wei Han
SIGOPS
2010
162views more  SIGOPS 2010»
13 years 6 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
ITCC
2005
IEEE
14 years 1 months ago
Using Formal Concept Analysis to Establish Model Dependencies
models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their ...
Igor Ivkovic, Kostas Kontogiannis
AEI
2007
91views more  AEI 2007»
13 years 7 months ago
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a tr...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
USS
2004
13 years 9 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta