Sciweavers

852 search results - page 77 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ICSE
1998
IEEE-ACM
15 years 8 months ago
A Model of Noisy Software Engineering Data (Status Report)
other projects in the database. Software development data is highly variable, which often result,s in underlying trends being hidden. In order to address this problem, a method of ...
Roseanne Tesoriero, Marvin V. Zelkowitz
DSN
2008
IEEE
15 years 6 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DGO
2007
150views Education» more  DGO 2007»
15 years 5 months ago
Integration of text-based applications into service-oriented architectures for transnational digital government
Significant efforts are currently being pursued by several countries and IT providers to deploy SOA (Service Oriented Architecture) designs of digital government systems that inte...
Andréa M. Matsunaga, Maurício O. Tsu...
CVPR
2010
IEEE
15 years 9 months ago
Optimal Coded Sampling for Temporal Super-Resolution
Conventional low frame rate cameras result in blur and/or aliasing in images while capturing fast dynamic events. Multiple low speed cameras have been used previously with stagger...
Amit Agrawal, Mohit Gupta, Ashok Veeraraghavan, Sr...
EUMAS
2006
15 years 5 months ago
Agent Capability: Automating the Design to Code Process
Current IT application domains such as web services and autonomic computing call for highly flexible systems, able to automatically adapt to changing operational environments as w...
Loris Penserini, Anna Perini, Angelo Susi, John My...