Sciweavers

1368 search results - page 206 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
127
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
117
Voted
SEMWEB
2009
Springer
15 years 9 months ago
Reasoning in Metamodeling Enabled Ontologies
Ontologies are expected to play an important role in many application domains, as well as in software engineering in general. One problem with using ontologies within software engi...
Nophadol Jekjantuk, Gerd Gröner, Jeff Z. Pan
146
Voted
CDVE
2006
Springer
160views Visualization» more  CDVE 2006»
15 years 6 months ago
Automated Social Network Analysis for Collaborative Work
Inter-networked computers enable virtual collaborative work. In the course of interacting with one another, individuals send and receive messages and files of various sorts. This m...
Larry Korba, Ronggong Song, George Yee, Andrew S. ...
ACMACE
2004
ACM
15 years 8 months ago
AR-bowling: immersive and realistic game play in real environments using augmented reality
The game and entertainment industry plays an enormous role within the development and extensive usage of new technologies. They are one major technology driver concerning the deve...
Carsten Matysczok, Rafael Radkowski, Jan Berssenbr...
137
Voted
USENIX
1993
15 years 3 months ago
The Nachos Instructional Operating System
In teaching operating systems at an undergraduate level, we believe that it is important to provide a project that is realistic enough to show how real operating systems work, yet...
Wayne A. Christopher, Steven J. Procter, Thomas E....