Sciweavers

4349 search results - page 345 / 870
» A Comprehensive Process Model for Studying Software Process ...
Sort
View
RAID
2009
Springer
15 years 11 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
15 years 11 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
SOFTVIS
2010
ACM
15 years 2 months ago
Dependence cluster visualization
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid ...
Syed S. Islam, Jens Krinke, David Binkley
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
15 years 11 months ago
Core and Periphery in Free/Libre and Open Source Software Team Communications
The concept of the core group of developers is important and often discussed in empirical studies of FLOSS projects. This paper examines the question, “how does one empirically ...
Kevin Crowston, Kangning Wei, Qing Li, James Howis...
ISLPED
2007
ACM
99views Hardware» more  ISLPED 2007»
15 years 6 months ago
Thermal-aware task scheduling at the system software level
Power-related issues have become important considerations in current generation microprocessor design. One of these issues is that of elevated on-chip temperatures. This has an ad...
Jeonghwan Choi, Chen-Yong Cher, Hubertus Franke, H...