Sciweavers

2741 search results - page 298 / 549
» Engineering Mathematical Knowledge
Sort
View
ICSE
2007
IEEE-ACM
16 years 4 months ago
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
ICSE
2007
IEEE-ACM
16 years 4 months ago
WebSob: A Tool for Robustness Testing of Web Services
Web services are a popular way of implementing a Service-Oriented Architecture. Testing can be used to help assure both the correctness and robustness of a web service. Because ma...
Evan Martin, Suranjana Basu, Tao Xie
143
Voted
IUI
2009
ACM
16 years 25 days ago
Multi-touch interaction for robot control
Recent developments in multi-touch technologies have exposed fertile ground for research in enriched humanrobot interaction. Although multi-touch technologies have been used for v...
Mark Micire, Jill L. Drury, Brenden Keyes, Holly A...
ICSE
2009
IEEE-ACM
15 years 10 months ago
Can peer code reviews be exploited for later information needs?
Code reviews have proven to be an effective means of improving overall software quality. During the review, there is an exchange of knowledge between the code author and reviewer ...
Andrew Sutherland, Gina Venolia
ICSE
2009
IEEE-ACM
15 years 10 months ago
Using Bayesian statistical methods to determine the level of error in large spreadsheets
Spreadsheets are ubiquitous with evidence that Microsoft Excel, the leading application in the area, has an install base of 90% on end-user desktops. Nowhere is the usage of sprea...
Leslie Bradley, Kevin McDaid