Sciweavers

2487 search results - page 283 / 498
» Collaborative Engineering Software Development: Ontology-Bas...
Sort
View
132
Voted
ISSRE
2010
IEEE
15 years 16 days ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
IWPC
2007
IEEE
15 years 9 months ago
Detecting Interaction Coupling from Task Interaction Histories
A repository of task structures can reveal important latent knowledge about the development of a software system. Although approaches have been proposed to recover artifacts withi...
Lijie Zou, Michael W. Godfrey, Ahmed E. Hassan
XPU
2004
Springer
15 years 8 months ago
When XP Met Outsourcing
Outsourcing is common for software development, and is the context for many projects using agile development processes. This paper presents two case studies concentrating on the cu...
Angela Martin, Robert Biddle, James Noble
137
Voted
KCAP
2005
ACM
15 years 8 months ago
An ontological approach to the construction of problem-solving models
Our ongoing work aims at defining an ontology-centered approach for building expertise models for the CommonKADS methodology. This approach (which is named "OntoKADS") i...
Sabine Bruaux, Gilles Kassel, Gilles Morel
155
Voted
FIDJI
2003
Springer
15 years 7 months ago
Hard Real-Time Implementation of Embedded Software in JAVA
The popular slogan ”write once, run anywhere” effectively renders the expressive capabilities of the Java programming framework for developing, deploying, and reusing target-i...
Jean-Pierre Talpin, Abdoulaye Gamatié, Davi...