Sciweavers

1257 search results - page 125 / 252
» Open Source Requirements Engineering
Sort
View
110
Voted
CAISE
2003
Springer
15 years 7 months ago
Processing Queries in a Large Peer-to-Peer System
While current search engines seem to easily handle the size of the data available on the Internet, they cannot provide fresh results. The most up-to-date data always resides on the...
Leonidas Galanis, Yuan Wang, Shawn R. Jeffery, Dav...
CIMCA
2008
IEEE
15 years 9 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
149
Voted
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 8 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
PROFES
2004
Springer
15 years 8 months ago
Refactoring Support Based on Code Clone Analysis
Abstract. Software maintenance is the most expensive activity in software development. Many software companies spent a large amount of cost to maintain the existing software system...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
129
Voted
ICIP
2009
IEEE
15 years 10 days ago
Semantic keyword extraction via adaptive text binarization of unstructured unsourced video
We propose a fully automatic method for summarizing and indexing unstructured presentation videos based on text extracted from the projected slides. We use changes of text in the ...
Michele Merler, John R. Kender