Sciweavers

3792 search results - page 60 / 759
» Techniques for Trusted Software Engineering
Sort
View
AIRWEB
2006
Springer
14 years 1 months ago
Web Spam Detection with Anti-Trust Rank
Spam pages on the web use various techniques to artificially achieve high rankings in search engine results. Human experts can do a good job of identifying spam pages and pages wh...
Vijay Krishnan, Rashmi Raj
CSMR
2007
IEEE
14 years 4 months ago
The Sisyphus Continuous Integration System
Integration hell is a prime example of software evolution gone out of control. The Sisyphus continuous integration system is designed to prevent this situation in the context of c...
Tijs van der Storm
ICSE
2007
IEEE-ACM
14 years 10 months ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price
SIGSOFT
2010
ACM
13 years 7 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
NJC
2006
119views more  NJC 2006»
13 years 10 months ago
A Model-Driven Approach to Variability Management in Product-Line Engineering
Object-oriented frameworks play an essential role in the implementation of product-line architectures (PLAs) for product families. However, recent case studies reveal that deriving...
André L. Santos, Kai Koskimies, Antó...