Sciweavers

ACSC
2006
IEEE
14 years 5 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero
ACSC
2006
IEEE
14 years 5 months ago
Trust network analysis with subjective logic
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formali...
Audun Jøsang, Ross Hayward, Simon Pope
ACSC
2006
IEEE
14 years 5 months ago
Shallow NLP techniques for internet search
Information Retrieval (IR) is a major component in many of our daily activities, with perhaps its most prominent role manifested in search engines. Today’s most advanced engines...
Alex Penev, Raymond K. Wong
ACSC
2006
IEEE
14 years 5 months ago
A framework for visual data mining of structures
Visual data mining has been established to effectively analyze large, complex numerical data sets. Especially, the extraction and visualization of inherent structures such as hie...
Hans-Jörg Schulz, Thomas Nocke, Heidrun Schum...
ACSC
2006
IEEE
14 years 5 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ACSC
2006
IEEE
14 years 5 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
ACSC
2006
IEEE
14 years 5 months ago
Improvements of TLAESA nearest neighbour search algorithm and extension to approximation search
Nearest neighbour (NN) searches and k nearest neighbour (k-NN) searches are widely used in pattern recognition and image retrieval. An NN (k-NN) search finds the closest object (...
Ken Tokoro, Kazuaki Yamaguchi, Sumio Masuda
ACSC
2006
IEEE
14 years 5 months ago
A JMX toolkit for merging network management systems
The ever increasing size of networks has resulted in a corresponding escalation of administration costs and lengthy deployment cycles. Clearly, more scalable and flexible network...
Feng Lu, Kris Bubendorfer
ACSC
2006
IEEE
14 years 5 months ago
Throughput fairness in k-ary n-cube networks
The performance of an interconnection network is measured by two metrics: average latency and peak network throughput. Network throughput is the total number of packets delivered ...
Cruz Izu