Sciweavers

2926 search results - page 553 / 586
» Document Analysis
Sort
View
APSEC
2003
IEEE
15 years 3 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
ASPLOS
2010
ACM
15 years 2 months ago
Modeling GPU-CPU workloads and systems
Heterogeneous systems, systems with multiple processors tailored for specialized tasks, are challenging programming environments. While it may be possible for domain experts to op...
Andrew Kerr, Gregory F. Diamos, Sudhakar Yalamanch...
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
15 years 2 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
CIKM
2001
Springer
15 years 2 months ago
Keeping Found Things Found on the Web
This paper describes the results of an observational study into the methods people use to manage web information for re-use. People observed in our study used a diversity of metho...
William P. Jones, Harry Bruce, Susan T. Dumais
92
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw