Sciweavers

1005 search results - page 49 / 201
» Software Localization: Issues and Methods
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
CODES
2009
IEEE
14 years 3 months ago
Native MPSoC co-simulation environment for software performance estimation
Performance estimation of Multi-Processor System-On-Chip (MPa high abstraction level is required in order to perform early architecture exploration and accurate design validations...
Patrice Gerin, Mian Muhammad Hamayun, Fréd&...
BMCBI
2010
142views more  BMCBI 2010»
13 years 11 months ago
Discover Protein Complexes in Protein-Protein Interaction Networks Using Parametric Local Modularity
Background: Recent advances in proteomic technologies have enabled us to create detailed protein-protein interaction maps in multiple species and in both normal and diseased cells...
Jongkwang Kim, Kai Tan
ICSE
2004
IEEE-ACM
14 years 11 months ago
Supporting Reflective Practitioners
The theme and title for this panel is inspired by Donald Sch?n's writings about the reflective practitioner in which he describes professional practice as being a process of ...
David F. Redmiles, Kumiyo Nakakoji
RE
2008
Springer
13 years 10 months ago
Requirements Prioritization Based on Benefit and Cost Prediction: An Agenda for Future Research
In early phases of the software cycle, requirements prioritization necessarily relies on the specified requirements and on predictions of benefit and cost of individual requiremen...
Andrea Herrmann, Maya Daneva