Sciweavers

3066 search results - page 486 / 614
» On Facilitating Automated Evaluation
Sort
View
ICDE
2007
IEEE
152views Database» more  ICDE 2007»
14 years 2 months ago
Automatically Identifying Known Software Problems
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated dia...
Natwar Modani, Rajeev Gupta, Guy M. Lohman, Tanvee...
IEEESCC
2007
IEEE
14 years 2 months ago
Intelligent Document Gateway - A Ser vice System Analysis
In today’s fast paced world, it is necessary to process business documents expediently, accurately, and diligently. In other words, processing has to be fast, errors must be pre...
Vikas Krishna, John Bailey, Ana Lelescu
IPPS
2007
IEEE
14 years 2 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
ITNG
2007
IEEE
14 years 2 months ago
SERT: Software Tool for Generating Student Engagement Reports
Drawing on our previous work on survey and reporting tools that compare faculty expectations with what students report experiencing in class, this paper presents details of a new ...
Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dasca...
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr