Sciweavers

6960 search results - page 1159 / 1392
» Continuity Analysis of Programs
Sort
View
IRI
2006
IEEE
15 years 9 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
113
Voted
ISESE
2006
IEEE
15 years 9 months ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili
159
Voted
ISSRE
2006
IEEE
15 years 9 months ago
Call Stack Coverage for GUI Test-Suite Reduction
—Graphical user interfaces (GUIs) are used as front ends to most of today’s software applications. The event-driven nature of GUIs presents new challenges for testing. One impo...
Scott McMaster, Atif M. Memon
WECWIS
2006
IEEE
137views ECommerce» more  WECWIS 2006»
15 years 9 months ago
Real Time Business Intelligence for the Adaptive Enterprise
— In today's competitive environment, analysing data to predict market trends of products and services and to improve the performance of enterprise systems is an essential b...
Ben Azvine, Zhan Cui, Detlef Nauck, Basim A. Majee...
150
Voted
VALUETOOLS
2006
ACM
176views Hardware» more  VALUETOOLS 2006»
15 years 9 months ago
How to solve large scale deterministic games with mean payoff by policy iteration
Min-max functions are dynamic programming operators of zero-sum deterministic games with finite state and action spaces. The problem of computing the linear growth rate of the or...
Vishesh Dhingra, Stephane Gaubert
« Prev « First page 1159 / 1392 Last » Next »