Sciweavers

439 search results - page 11 / 88
» Identification of Software Instabilities
Sort
View
APSEC
2004
IEEE
13 years 11 months ago
SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing
Sensors in ubiquitous computing provide a new opportunity to extend existing RFID capabilities to situation-awareness. This paper proposes several alternatives of the Situation-Aw...
Dongwon Jeong, Young-Gab Kim, Hoh Peter In
REFSQ
2009
Springer
14 years 8 days ago
Early Identification of Problem Interactions: A Tool-Supported Approach
Thein Than Tun, Yijun Yu, Robin C. Laney, Bashar N...
IM
2003
13 years 9 months ago
Using Neural Networks to Identify Control and Management Plane Poison Messages
: Poison message failure propagation is a mechanism that has been responsible for large scale failures in both telecommunications and IP networks: Some or all of the network elemen...
Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog
ASE
1999
90views more  ASE 1999»
13 years 7 months ago
A Concept Formation Based Approach to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In or...
Houari A. Sahraoui, Hakim Lounis, Walcélio ...
IEE
2002
110views more  IEE 2002»
13 years 7 months ago
Open source software projects as virtual organisations: competency rallying for software development
: This paper contributes to the identification and testing of factors important for the success of open source software (OSS) projects. We present an analysis of OSS communities as...
Kevin Crowston, Barbara Scozzi