Sciweavers

2441 search results - page 334 / 489
» Engineering a Tool to Detect Automatically Generated Papers
Sort
View
ESE
2008
112views Database» more  ESE 2008»
15 years 4 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
DAC
2002
ACM
16 years 5 months ago
Hole analysis for functional coverage data
One of the main goals of coverage tools is to provide the user with informative presentation of coverage information. Specifically, information on large, cohesive sets of uncovere...
Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv
HCI
2009
15 years 2 months ago
Developing, Deploying and Assessing Usage of a Movie Archive System among Students of Film Studies
This paper describes our work in developing a movie browser application for students of Film Studies at our University. The aim of our work is to address the issues that arise when...
Nazlena Mohamad Ali, Alan F. Smeaton, Hyowon Lee, ...
CSCW
2012
ACM
14 years 3 days ago
CoRED: browser-based Collaborative Real-time Editor for Java web applications
While the users of completed applications are heavily moving from desktop to the web browser, the majority of developers are still working with desktop IDEs such as Eclipse or Vis...
Janne Lautamäki, Antti Nieminen, Johannes Kos...
DSOM
2006
Springer
15 years 8 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...