Sciweavers

4762 search results - page 724 / 953
» About the use of protein models
Sort
View
119
Voted
NDSS
2009
IEEE
15 years 8 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
ICSM
2009
IEEE
15 years 8 months ago
On predicting the time taken to correct bug reports in open source projects
Existing studies on the maintenance of open source projects focus primarily on the analyses of the overall maintenance of the projects and less on specific categories like the co...
Prasanth Anbalagan, Mladen A. Vouk
AIED
2009
Springer
15 years 8 months ago
Looking Into Collaborative Learning: Design from Macro- and Micro-Script Perspectives
Design of collaborative learning (CL) scenarios is a complex task, but necessary if the goal of the collaboration is learning. Creating well-thought-out CL scenarios requires exper...
Eloy D. Villasclaras-Fernández, Seiji Isota...
SLE
2009
Springer
15 years 8 months ago
Language Evolution in Practice: The History of GMF
In consequence of changing requirements and technological progress, software languages are subject to change. The changes affect the language’s specification, which in turn a...
Markus Herrmannsdoerfer, Daniel Ratiu, Guido Wachs...
SPIN
2009
Springer
15 years 8 months ago
A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks
Abstract. We present a new decision procedure for detecting property violations in pushdown models for concurrent programs that use lock-based synchronization, where each thread’...
Nicholas Kidd, Peter Lammich, Tayssir Touili, Thom...