Sciweavers

11653 search results - page 2186 / 2331
» The Development of the C Language
Sort
View
136
Voted
KBSE
2007
IEEE
15 years 9 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
SASO
2007
IEEE
15 years 9 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
151
Voted
ATC
2007
Springer
15 years 9 months ago
An Architecture for Self-healing Autonomous Object Groups
Abstract. Jgroup/ARM is a middleware for developing and operating dependable distributed Java applications. Jgroup integrates the distributed object model of Java RMI with the obje...
Hein Meling
126
Voted
CCS
2007
ACM
15 years 9 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
163
Voted
CIVR
2007
Springer
169views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Whitened LDA for face recognition
Over the years, many Linear Discriminant Analysis (LDA) algorithms have been proposed for the study of high dimensional data in a large variety of problems. An intrinsic limitatio...
Vo Dinh Minh Nhat, Sungyoung Lee, Hee Yong Youn
« Prev « First page 2186 / 2331 Last » Next »