Sciweavers

1519 search results - page 191 / 304
» What do they think
Sort
View
OSDI
2002
ACM
14 years 11 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...
ICSE
2004
IEEE-ACM
14 years 11 months ago
Evidence-Based Software Engineering
Objective: Our objective is to describe how software engineering might benefit from an evidence-based approach and to identify the potential difficulties associated with the appro...
Barbara A. Kitchenham, Magne Jørgensen, Tor...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Information Needs in Collocated Software Development Teams
Previous research has documented the fragmented nature of software development work, with frequent interruptions and coordination. To explain this in more detail, we analyzed soft...
Andrew J. Ko, Robert DeLine, Gina Venolia
SDM
2009
SIAM
173views Data Mining» more  SDM 2009»
14 years 8 months ago
Discretized Spatio-Temporal Scan Window.
The focus of this paper is the discovery of anomalous spatio-temporal windows. We propose a Discretized SpatioTemporal Scan Window approach to address the question of how we can t...
Aryya Gangopadhyay, Seyed H. Mohammadi, Vandana Pu...
SOFSEM
2010
Springer
14 years 7 months ago
Web Science: The Digital-Heritage Case
Web Science studies the interpay between web technology and the human behaviour it induces at the micro, meso and macro level. extended abstract we examine Web Science research iss...
Guus Schreiber