Sciweavers

1989 search results - page 331 / 398
» Modeling presentation layers of web applications for testing
Sort
View
139
Voted
WSC
2007
15 years 6 months ago
An exploration-based taxonomy for emergent behavior analysis in simulations
Emergent behaviors in simulations require explanation, so that valid behaviors can be separated from design or coding errors. We present a taxonomy, to be applied to emergent beha...
Ross Gore, Paul F. Reynolds Jr.
150
Voted
KDD
2009
ACM
194views Data Mining» more  KDD 2009»
16 years 4 months ago
Combining link and content for community detection: a discriminative approach
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu
CHI
2005
ACM
16 years 4 months ago
Comparing usability problems and redesign proposals as input to practical systems development
Usability problems predicted by evaluation techniques are useful input to systems development; it is uncertain whether redesign proposals aimed at alleviating those problems are l...
Erik Frøkjær, Kasper Hornbæk
179
Voted
PLDI
2003
ACM
15 years 9 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
124
Voted
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
15 years 8 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser