Sciweavers

78 search results - page 2 / 16
» Comparative Analysis of Technical Methods for Detecting Soft...
Sort
View
BMCBI
2008
169views more  BMCBI 2008»
13 years 10 months ago
CompMoby: Comparative MobyDick for detection of cis-regulatory motifs
Background: The regulation of gene expression is complex and occurs at many levels, including transcriptional and post-transcriptional, in metazoans. Transcriptional regulation is...
Christina Chaivorapol, Collin Melton, Grace Wei, R...
ESEM
2007
ACM
14 years 2 months ago
Comparison of Outlier Detection Methods in Fault-proneness Models
In this paper, we experimentally evaluated the effect of outlier detection methods to improve the prediction performance of fault-proneness models. Detected outliers were removed ...
Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden, ...
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
14 years 4 months ago
A Static Birthmark of Binary Executables Based on API Call Structure
Abstract. A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static bi...
Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Ha...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
IWPSE
2003
IEEE
14 years 3 months ago
CVS Release History Data for Detecting Logical Couplings
The dependencies and interrelations between classes and modules affect the maintainability of object-oriented systems. It is therefore important to capture weaknesses of the softw...
Harald Gall, Mehdi Jazayeri, Jacek Krajewski