Sciweavers

102 search results - page 11 / 21
» Software Engineering Research Strategy: Combining Experiment...
Sort
View
IWPC
2005
IEEE
14 years 2 months ago
A Qualitative Comparison of Three Aspect Mining Techniques
The fact that crosscutting concerns (aspects) cannot be well modularized in object oriented software is an impediment to program comprehension: the implementation of a concern is ...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
VAMOS
2007
Springer
14 years 2 months ago
Using Goal-Models to Analyze Variability
On our ongoing research on variability analysis, two major drawbacks have been identified: a) the lack of an effective tracing from the rationale to the selected variant, and b) t...
Bruno González-Baixauli, Miguel A. Laguna, ...
CIKM
2010
Springer
13 years 6 months ago
Utilizing re-finding for personalized information retrieval
Individuals often use search engines to return to web pages they have previously visited. This behaviour, called refinding, accounts for about 38% of all queries. While researcher...
Sarah K. Tyler, Jian Wang, Yi Zhang 0001
COMPSAC
2008
IEEE
14 years 3 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
14 years 2 months ago
ACOhg: dealing with huge graphs
Ant Colony Optimization (ACO) has been successfully applied to those combinatorial optimization problems which can be translated into a graph exploration. Artificial ants build s...
Enrique Alba, J. Francisco Chicano