Sciweavers

5961 search results - page 1016 / 1193
» Design Science and Software Engineering
Sort
View
132
Voted
WILF
2005
Springer
86views Fuzzy Logic» more  WILF 2005»
15 years 9 months ago
Intelligent Track Analysis on Navy Platforms Using Soft Computing
We have developed and continue to enhance automated intelligent software that performs the tasks and decision making which now occurs by the personnel manning watch stations in the...
Robert Richards, Richard Stottler, Ben Ball, Cosku...
113
Voted
PLDI
2004
ACM
15 years 8 months ago
The set constraint/CFL reachability connection in practice
Many program analyses can be reduced to graph reachability problems involving a limited form of context-free language reachability called Dyck-CFL reachability. We show a new redu...
John Kodumal, Alexander Aiken
ICSOC
2004
Springer
15 years 8 months ago
Knowledge-driven interactions with services across ad hoc networks
Service oriented computing, with its aim of unhindered interoperability, is an appropriate paradigm for ad hoc networks, which are characterized by physical mobility of heterogeno...
Rohan Sen, Radu Handorean, Gruia-Catalin Roman, Gr...
SEKE
2004
Springer
15 years 8 months ago
UCDA: Use Case Driven Development Assistant Tool for Class Model Generation
The development of class models using the Rational Unified Process (RUP) requires complete, correct and unambiguous use case specification documents. The Use Case Driven Developmen...
Kalaivani Subramaniam, Dong Liu, Behrouz Homayoun ...
178
Voted
IAW
2003
IEEE
15 years 8 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
« Prev « First page 1016 / 1193 Last » Next »