Sciweavers

1597 search results - page 216 / 320
» A Design Method for Object-Oriented Programming
Sort
View
249
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 10 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
106
Voted
CIKM
2009
Springer
15 years 10 months ago
Tree-pattern-based duplicate code detection
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...
Hyo-Sub Lee, Kyung-Goo Doh
114
Voted
WAIM
2005
Springer
15 years 9 months ago
Extracting, Presenting and Browsing of Web Social Information
We address the problem that current Web applications present mainly the content-centric information, but lack cues and browsing mechanisms for online social information. After summ...
Yi Wang, Li-Zhu Zhou
99
Voted
ZUM
1992
Springer
15 years 7 months ago
Specification in Fresco
software in the form of abstract classes; and the specification elements of the language can also be used in concrete classes to document the implementations and their development ...
Alan Wills
146
Voted
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
15 years 7 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto