Sciweavers

852 search results - page 36 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
IIWAS
2007
15 years 5 months ago
Implementing Semantic Interoperability in Electronic Auctions
Electronic marketplaces can provide several types of business processes depending upon their target audience. A form of such processes is electronic auction. It is a system for ac...
Juha Puustjärvi
MMM
2006
Springer
128views Multimedia» more  MMM 2006»
15 years 10 months ago
An improved distortion model for rate control of DCT-based video coding
This paper presents a rate control algorithm for the dominant discrete cosine transform (DCT) -based video coding. It is developed based on a more accurate rate-distortion (RD) mo...
Jun Xie, Liang-Tien Chia, Bu-Sung Lee
161
Voted
METRICS
2003
IEEE
15 years 9 months ago
A Metrics Suite for Measuring Reusability of Software Components
In component-based software development, it is necessary to measure the reusability of components in order to realize the reuse of components effectively. There are some product m...
Hironori Washizaki, Hirokazu Yamamoto, Yoshiaki Fu...
CSMR
2010
IEEE
14 years 11 months ago
A Heuristic-Based Approach to Identify Concepts in Execution Traces
Abstract--Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understandin...
Fatemeh Asadi, Massimiliano Di Penta, Giuliano Ant...