Sciweavers

415 search results - page 60 / 83
» Evaluating software refactoring tool support
Sort
View
HPCA
2005
IEEE
14 years 8 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ASWEC
2000
IEEE
14 years 3 days ago
Implementing an Experience Factory Based on Existing Organizational Knowledge
This paper describes the development of an experience factory in an Australian organization involved in the field of telecommunications. Faced with improvement needs, in 1998 the ...
Arne Koennecker, D. Ross Jeffery, Graham C. Low
SOFSEM
2007
Springer
14 years 1 months ago
Personalized Presentation in Web-Based Information Systems
Abstract. Large information spaces and complex functionality of contemporary systems together with the advent of the Semantic Web are big challenges for the design of simple yet po...
Michal Tvarozek, Michal Barla, Mária Bielik...
CAV
2008
Springer
139views Hardware» more  CAV 2008»
13 years 9 months ago
CSIsat: Interpolation for LA+EUF
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Dirk Beyer, Damien Zufferey, Rupak Majumdar
SCFBM
2008
119views more  SCFBM 2008»
13 years 7 months ago
Permutation - based statistical tests for multiple hypotheses
Background: Genomics and proteomics analyses regularly involve the simultaneous test of hundreds of hypotheses, either on numerical or categorical data. To correct for the occurre...
Anyela Camargo, Francisco Azuaje, Haiying Wang, Hu...