Sciweavers

3066 search results - page 596 / 614
» On Facilitating Automated Evaluation
Sort
View
MSR
2010
ACM
13 years 9 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
CHI
2005
ACM
13 years 9 months ago
Designing human friendly human interaction proofs (HIPs)
HIPs, or Human Interactive Proofs, are challenges meant to be easily solved by humans, while remaining too hard to be economically solved by computers. HIPs are increasingly used ...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
DOCENG
2008
ACM
13 years 9 months ago
An exploratory mapping strategy for web-driven magazines
"There will always (I hope) be print books, but just as the advent of photography changed the role of painting or film changed the role of theater in our culture, electronic ...
Fabio Giannetti
EMSOFT
2008
Springer
13 years 9 months ago
Volatiles are miscompiled, and what to do about it
C's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memorysystem level. We tested thirteen product...
Eric Eide, John Regehr
ISSRE
2007
IEEE
13 years 9 months ago
Using In-Process Testing Metrics to Estimate Post-Release Field Quality
In industrial practice, information on the software field quality of a product is available too late in the software lifecycle to guide affordable corrective action. An important ...
Nachiappan Nagappan, Laurie Williams, Mladen A. Vo...