Sciweavers

2588 search results - page 371 / 518
» Project risk management
Sort
View
CCS
2007
ACM
15 years 10 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
CONTEXT
2007
Springer
15 years 10 months ago
Context-sensitive Referencing for Ontology Mapping Disambiguation
Abstract. Ontologies can be used for e-business integration, for example by describing existing e-business standards as ontologies. If cooperating parties use different ontologies...
Heiko Paulheim, Michael Rebstock, Janina Fengel
ICCS
2007
Springer
15 years 10 months ago
Construction of Ontology-Based Software Repositories by Text Mining
Software document repositories store artifacts produced in the course of developing software products. But most repositories are simply archives of documents. It is not unusual to ...
Yan Wu, Harvey P. Siy, Mansour Zand, Victor L. Win...
AICT
2006
IEEE
15 years 10 months ago
Privacy and data protection in technology-enhanced professional learning
Privacy provision and data protection are basic requirements for professional learning, especially when personalized systems are used that adapt to sensitive learner personal data...
Tomaz Klobucar
CCGRID
2006
IEEE
15 years 10 months ago
Uniform Job Monitoring using the HPC-Europa Single Point of Access
—Job monitoring in Grid systems presents an important challenge due to Grid environments are volatile, heterogeneous, not reliable and are managed by different middlewares and mo...
Francesc Guim, Ivan Rodero, Julita Corbalán...