Sciweavers

254 search results - page 34 / 51
» Safe-commit analysis to facilitate team software development
Sort
View
SIGSOFT
2008
ACM
14 years 8 months ago
Can developer-module networks predict failures?
Software teams should follow a well defined goal and keep their work focused. Work fragmentation is bad for efficiency and quality. In this paper we empirically investigate the re...
Martin Pinzger, Nachiappan Nagappan, Brendan Murph...
MOBISYS
2004
ACM
14 years 7 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
AICCSA
2006
IEEE
179views Hardware» more  AICCSA 2006»
14 years 1 months ago
Supporting the SPEM with a UML Extended Workflow Metamodel
The specification, analysis, and administration of business processes have charged great importance in this last time. This has been caused by a competitive industry necessity, dy...
Narayan C. Debnath, Daniel Riesco, Manuel Pé...
BMCBI
2007
112views more  BMCBI 2007»
13 years 7 months ago
Inferring biological functions and associated transcriptional regulators using gene set expression coherence analysis
Background: Gene clustering has been widely used to group genes with similar expression pattern in microarray data analysis. Subsequent enrichment analysis using predefined gene s...
Tae-Min Kim, Yeun-Jun Chung, Mun-Gan Rhyu, Myeong ...
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
14 years 1 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...