Sciweavers

1327 search results - page 114 / 266
» Cost-Benefit Analysis of Software Development Techniques and...
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 4 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
EMO
2006
Springer
124views Optimization» more  EMO 2006»
15 years 1 months ago
I-MODE: An Interactive Multi-objective Optimization and Decision-Making Using Evolutionary Methods
With the popularity of efficient multi-objective evolutionary optimization (EMO) techniques and the need for such problem-solving activities in practice, EMO methodologies and EMO ...
Kalyanmoy Deb, Shamik Chaudhuri
IWPC
2009
IEEE
15 years 4 months ago
Who can help me with this change request?
An approach to recommend a ranked list of developers to assist in performing software changes given a textual change request is presented. The approach employs a two-fold strategy...
Huzefa H. Kagdi, Denys Poshyvanyk
SOSE
2008
IEEE
15 years 4 months ago
Towards SOA-Based Code Defect Analysis
Static code analysis is the analysis of software that is performed to acquire information concerning the dynamic behavior of programs built from that software, without actually ex...
Qianxiang Wang, Na Meng, Zhiyi Zhou, Jinhui Li, Ho...
91
Voted
ICWE
2010
Springer
15 years 2 months ago
Customization Realization in Multi-tenant Web Applications: Case Studies from the Library Sector
Abstract. There are insufficient examples available of how customization is realized in multi-tenant web applications, whereas developers are looking for examples and patterns as ...
Slinger Jansen, Geert-Jan Houben, Sjaak Brinkkempe...