Sciweavers

9640 search results - page 1735 / 1928
» Information Systems Development as an Activity
Sort
View
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 8 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
CHI
2010
ACM
14 years 3 months ago
Mobile-izing health workers in rural India
Researchers have long been interested in the potential of ICTs to enable positive change in developing regions communities. In these environments, ICT interventions often fail bec...
Divya Ramachandran, John Canny, Prabhu Dutta Das, ...
CISS
2008
IEEE
14 years 2 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
AUSDM
2007
Springer
100views Data Mining» more  AUSDM 2007»
14 years 2 months ago
An E-Market Framework to Determine the Strength of Business Relationships between Intelligent Agents
When an agent enters in an e-Market for the first time, it has no historical information that can be used to determine the strength of business relationship with participant agen...
Khandaker Shahidul Islam
ACMSE
2006
ACM
14 years 2 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
« Prev « First page 1735 / 1928 Last » Next »