Sciweavers

1767 search results - page 248 / 354
» Open Source Ecology
Sort
View
108
Voted
KBSE
2007
IEEE
15 years 10 months ago
Towards automatic model synchronization from model transformations
The metamodel techniques and model transformation techniques provide a standard way to represent and transform data, especially the software artifacts in software development. How...
Yingfei Xiong, Dongxi Liu, Zhenjiang Hu, Haiyan Zh...
126
Voted
KBSE
2007
IEEE
15 years 10 months ago
Keyword programming in java
Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of keywords provided by t...
Greg Little, Robert C. Miller
158
Voted
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
15 years 10 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
WCRE
2007
IEEE
15 years 10 months ago
Quality Assessment Based on Attribute Series of Software Evolution
Defect density and defect prediction are essential for efficient resource allocation in software evolution. In an empirical study we applied data mining techniques for value seri...
Jacek Ratzinger, Harald Gall, Martin Pinzger
BTW
2007
Springer
123views Database» more  BTW 2007»
15 years 10 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich