Sciweavers

43 search results - page 7 / 9
» ijactaicit 2010
Sort
View
IJACTAICIT
2010
123views more  IJACTAICIT 2010»
13 years 2 months ago
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
Osamu Mizuno, Hideaki Hata
IJACTAICIT
2010
200views more  IJACTAICIT 2010»
13 years 2 months ago
An Intelligent Framework for Natural Object Identification in Images
Human superiority over computers in identifying natural objects like clouds, water, grass etc. comes from two capabilities: the capability to maintain a growing knowledge base per...
Aasia Khanum
IJACTAICIT
2010
151views more  IJACTAICIT 2010»
13 years 3 days ago
The Comparative Study of Software Optimal Release Time Based on Burr Distribution
It is great practical interest to decide when to stop testing a software system in development phase and transfer it to the user. This problem is called as the optimal software re...
Hee-Cheul Kim, Hyoung-Keun Park
IJACTAICIT
2010
155views more  IJACTAICIT 2010»
13 years 2 months ago
Constructive Dynamic Program Slicing Research
Program slicing is a promising technique for providing automated support for various important software engineering activities. There exists hundreds of scientific studies on the ...
Jaakko Korpi, Jussi Koskinen
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 2 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa