Sciweavers

2281 search results - page 399 / 457
» Design and Evaluation of a Multiagent Autonomic Information ...
Sort
View
SAC
2008
ACM
13 years 7 months ago
Workflow management versus case handling: results from a controlled software experiment
Business Process Management (BPM) technology has become an important instrument for improving process performance. When considering its use, however, enterprises typically have to...
Bela Mutschler, Barbara Weber, Manfred Reichert
TOSEM
2010
159views more  TOSEM 2010»
13 years 6 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard
USS
2010
13 years 6 months ago
Cling: A Memory Allocator to Mitigate Dangling Pointers
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...
Periklis Akritidis
SCIENTOMETRICS
2011
12 years 11 months ago
Accuracy of inter-researcher similarity measures based on topical and social clues
Scientific literature recommender systems (SLRSs) provide papers to researchers according to their scientific interests. Systems rely on inter-researcher similarity measures that...
Guillaume Cabanac
CCS
2004
ACM
14 years 1 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash