Sciweavers

406 search results - page 47 / 82
» Identifying Codes and Covering Problems
Sort
View
DKE
2008
85views more  DKE 2008»
13 years 8 months ago
On automatic knowledge validation for Bayesian knowledge bases
Knowledge validation, as part of knowledge base verification and validation is a critical process in knowledge engineering. The ultimate goal of this process is to make the knowle...
Eugene Santos Jr., Hang T. Dinh
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
14 years 3 months ago
Predicting reuse of end-user web macro scripts
Repositories of code written by end-user programmers are beginning to emerge, but when a piece of code is new or nobody has yet reused it, then current repositories provide users ...
Christopher Scaffidi, Christopher Bogart, Margaret...
SEKE
2005
Springer
14 years 2 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
ECOOP
2009
Springer
14 years 9 months ago
Security Monitor Inlining for Multithreaded Java
Abstract. Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
ECOOP
2003
Springer
14 years 1 months ago
Traits: Composable Units of Behaviour
Despite the undisputed prominence of inheritance as the fundamental reuse mechanism in object-oriented programming languages, the main variants — single inheritance, multiple inh...
Nathanael Schärli, Stéphane Ducasse, O...