Sciweavers

1599 search results - page 229 / 320
» A Reference Model for Knowledge Management in Software Engin...
Sort
View
TOSEM
2010
159views more  TOSEM 2010»
15 years 1 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard
119
Voted
GROUP
2007
ACM
15 years 7 months ago
That's what friends are for: facilitating 'who knows what' across group boundaries
We describe the design and evaluation of K-net, a social matching system to help people learn 'who knows what' in an organization by matching people with skills with tho...
N. Sadat Shami, Y. Connie Yuan, Dan Cosley, Ling X...
137
Voted
WORM
2003
15 years 4 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
WSC
2000
15 years 4 months ago
Optimizing production work flow using OpEMCSS
A graphical discrete event simulation library is proposed for system simulation that is based on interacting concurrent processes. This library works with EXTEND (Imagine That Inc...
John R. Clymer
CSCW
2002
ACM
15 years 3 months ago
Activity Theory and System Design: A View from the Trenches
An activity theory model and a mediating artifacts hierarchy were employed to help identify the needs for tools for customer support engineers who documented solutions to customer...
Patricia Collins, Shilpa Shukla, David F. Redmiles