Sciweavers

8179 search results - page 1402 / 1636
» The PRACTIONIST Development Tool
Sort
View
CAISE
2009
Springer
15 years 8 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
CF
2007
ACM
15 years 8 months ago
Identifying potential parallelism via loop-centric profiling
The transition to multithreaded, multi-core designs places a greater responsibility on programmers and software for improving performance; thread-level parallelism (TLP) will be i...
Tipp Moseley, Daniel A. Connors, Dirk Grunwald, Ra...
CHI
2007
ACM
15 years 8 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
NLDB
2010
Springer
15 years 8 months ago
Automatic Quality Assessment of Source Code Comments: The JavadocMiner
Abstract. An important software engineering artefact used by developers and maintainers to assist in software comprehension and maintenance is source code documentation. It provide...
Ninus Khamis, René Witte, Juergen Rilling
REFSQ
2010
Springer
15 years 8 months ago
Binary Priority List for Prioritizing Software Requirements
Product managers in software companies are confronted with a continuous stream of incoming requirements. Due to limited resources they have to make a selection of those that can be...
Thomas Bebensee, Inge van de Weerd, Sjaak Brinkkem...
« Prev « First page 1402 / 1636 Last » Next »