Sciweavers

Share
COMPSAC
2008
IEEE
10 years 4 months ago
Editable Replay of IDE-Based Repetitive Tasks
Ying Zhang, Gang Huang, Nuyun Zhang, Hong Mei
COMPSAC
2008
IEEE
10 years 4 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
COMPSAC
2008
IEEE
10 years 4 months ago
Service-Oriented Modelling of Automotive Systems
We discuss the suitability of service-oriented computing for the automotive domain. We present a formal high-level language in which complex automotive activities can be modelled ...
Laura Bocchi, José Luiz Fiadeiro, Ant&oacut...
COMPSAC
2008
IEEE
10 years 4 months ago
Towards Engineering Ontologies for Cognitive Profiling of Agents on the Semantic Web
Research shows that most agent-based collaborations suffer from lack of flexibility. This is due to the fact that most agent-based applications assume pre-defined knowledge of age...
Amna Basharat, Gabriella Spinelli
COMPSAC
2008
IEEE
10 years 4 months ago
On the Performance of Transactional Remote Invocations over Commonly Used Transports
We have measured the performance of transactional remote invocations over three commonly used transports: IIOP, SOAP/HTTP, and JBoss Remoting. In the IIOP case, our transactional ...
Ivan Silva Neto, Francisco Reverbel
COMPSAC
2008
IEEE
10 years 4 months ago
Ontology Model-Based Static Analysis on Java Programs
1 Typical enterprise and military software systems consist of millions of lines of code with complicated dependence on library abstractions. Manually debugging these codes imposes ...
Lian Yu, Jun Zhou, Yue Yi, Ping Li, Qianxiang Wang
COMPSAC
2008
IEEE
10 years 4 months ago
How to Enhance UDDI with Dependability Capabilities
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. Thi...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
COMPSAC
2008
IEEE
10 years 4 months ago
Design Methodology for a Modular Component Based Software Architecture
Michael Caragiozidis, Nikos Mouratidis, Christofor...
COMPSAC
2008
IEEE
10 years 4 months ago
Implicit Social Network Model for Predicting and Tracking the Location of Faults
— In software testing and maintenance activities, the observed faults and bugs are reported in bug report managing systems (BRMS) for further analysis and repair. According to th...
Ing-Xiang Chen, Cheng-Zen Yang, Ting-Kun Lu, Hojun...
COMPSAC
2008
IEEE
10 years 4 months ago
Entropy-Based Age Estimation of Blog Authors
In this investigation, we propose a probabilistic approach for estimating the ages of Blog authors by means of Naive Bayesian Classifier. We can learn context of characteristic wor...
Masataka Izumi, Takao Miura, Isamu Shioya
books