Sciweavers

ACMSE
2004
ACM
14 years 4 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ACMSE
2004
ACM
14 years 4 months ago
JRV: an interactive tool for data mining visualization
Danyu Liu, Alan P. Sprague, Upender Manne
ACMSE
2004
ACM
14 years 5 months ago
E-R modeler: a database modeling toolkit for Eclipse
Eclipse is a Java integrated development environment (IDE) and tool integration platform that offers numerous extension points for customization through a plug-in architecture. Th...
Song Zhou, Chuanxi Xu, Hui Wu, Jing Zhang, Yuehua ...
ACMSE
2004
ACM
14 years 5 months ago
Recent advances in mobility modeling for mobile ad hoc network research
In this paper, we survey recent advances in mobility modeling for mobile ad hoc network research. The advances include some new mobility models and analysis of older mobility mode...
Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray
ACMSE
2004
ACM
14 years 5 months ago
SA_MetaMatch: relevant document discovery through document metadata and indexing
SA_MetaMatch, a component of the Standards Advisor (SA), is designed to find relevant documents through matching indices of metadata and document content. The elements in the meta...
Hiu S. Yau, J. Scott Hawker
ACMSE
2004
ACM
14 years 5 months ago
Interface design for a modern software ticketing system
This paper describes issues in the design of IT-centric trouble-ticketing applications. Two prototypes are presented. The first introduces a user-centric, webaccessible thick clie...
Minhui Xie, Mark Tomlinson, Bobby Bodenheimer
ACMSE
2004
ACM
14 years 5 months ago
Topic-based clustering of news articles
Recent years have witnessed an explosion in the availability of news articles on the World Wide Web. Although searchengines’ algorithms have made it easier to locate these docum...
Najaf Ali Shah, Ehab M. ElBahesh
ACMSE
2004
ACM
14 years 5 months ago
A model-driven approach for generating embedded robot navigation control software
Real-time embedded systems are time-critical systems that are hard to implement as compared to traditional commercial software, due to the large number of conflicting requirements...
Bina Shah, Rachael Dennison, Jeff Gray
ACMSE
2004
ACM
14 years 5 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart