Sciweavers

15375 search results - page 2983 / 3075
» cans 2008
Sort
View
ICSM
2008
IEEE
15 years 11 months ago
Understanding the rationale for updating a function's comment
Up-to-date comments are critical for the successful evolution of a software application. When modifying a function, developers may update the comment associated with the function ...
Haroon Malik, Istehad Chowdhury, Hsiao-Ming Tsou, ...
ICSM
2008
IEEE
15 years 11 months ago
Retrieving relevant reports from a customer engagement repository
Customers of modern enterprise applications commonly engage the vendor of the application for onsite troubleshooting and fine tuning of large deployments. The results of these eng...
Dharmesh Thakkar, Zhen Ming Jiang, Ahmed E. Hassan...
122
Voted
ICSM
2008
IEEE
15 years 11 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
188
Voted
IEEEIAS
2008
IEEE
15 years 11 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
136
Voted
IEEEIAS
2008
IEEE
15 years 11 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
« Prev « First page 2983 / 3075 Last » Next »