Sciweavers

852 search results - page 119 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
PERCOM
2003
ACM
16 years 3 months ago
Providing Contextual Information to Pervasive Computing Applications
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which the...
Glenn Judd, Peter Steenkiste
DASFAA
2007
IEEE
183views Database» more  DASFAA 2007»
15 years 10 months ago
BioDIFF: An Effective Fast Change Detection Algorithm for Biological Annotations
Abstract. Warehousing heterogeneous, dynamic biological data is a key technique for biological data integration as it greatly improves performance. However, it requires complex mai...
Yang Song, Sourav S. Bhowmick, C. Forbes Dewey
CCS
2007
ACM
15 years 10 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
ICSE
2010
IEEE-ACM
15 years 6 months ago
Supporting developers with natural language queries
The feature list of modern IDEs is steadily growing and mastering these tools becomes more and more demanding, especially for novice programmers. Despite their remarkable capabili...
Michael Würsch, Giacomo Ghezzi, Gerald Reif, ...
CSCW
2006
ACM
15 years 10 months ago
Shared waypoints and social tagging to support collaboration in software development
This paper presents the conceptual design of TagSEA, a collaborative tool to support asynchronous software development. Our goal is to develop a lightweight source code annotation...
Margaret-Anne D. Storey, Li-Te Cheng, R. Ian Bull,...