Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
439
search results - page 8 / 88
»
Identification of Software Instabilities
Sort
relevance
views
votes
recent
update
View
thumb
title
17
click to vote
ISCI
2006
66
views
more
ISCI 2006
»
Identification of defect-prone classes in telecommunication software systems using design metrics
13 years 7 months ago
Download
www.inf.unibz.it
Andrea Janes, Marco Scotto, Witold Pedrycz, Barbar...
claim paper
Read More »
13
click to vote
SMR
2008
69
views
more
SMR 2008
»
Automatic identification of key classes in a software system using webmining techniques
13 years 7 months ago
Download
swerl.tudelft.nl
Andy Zaidman, Serge Demeyer
claim paper
Read More »
18
click to vote
BIOINFORMATICS
2005
64
views
more
BIOINFORMATICS 2005
»
pFind: a novel database-searching software system for automated peptide and protein identification via tandem mass spectrometry
13 years 7 months ago
Download
pfind.ict.ac.cn
Dequan Li, Yan Fu, Ruixiang Sun, Charles X. Ling, ...
claim paper
Read More »
17
click to vote
SAC
2002
ACM
73
views
Applied Computing
»
more
SAC 2002
»
Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reus
13 years 7 months ago
Download
www.dirc.org.uk
Denis Besnard, Anthony T. Lawrie
claim paper
Read More »
22
click to vote
TIFS
2010
171
views
more
TIFS 2010
»
A method for automatic identification of signatures of steganography software
13 years 2 months ago
Download
www.csie.mcu.edu.tw
Abstract--A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized ...
Graeme Bell, Yeuan-Kuen Lee
claim paper
Read More »
« Prev
« First
page 8 / 88
Last »
Next »