Sciweavers

213 search results - page 31 / 43
» Expertise recommender: a flexible recommendation system and ...
Sort
View
SIGSOFT
2007
ACM
16 years 13 days ago
Does a programmer's activity indicate knowledge of code?
The practice of software development can likely be improved if an externalized model of each programmer's knowledge of a particular code base is available. Some tools already...
Thomas Fritz, Gail C. Murphy, Emily Hill
IPPS
2006
IEEE
15 years 5 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
IPPS
2005
IEEE
15 years 5 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif
DSRT
2005
IEEE
15 years 5 months ago
Using Web Services and Data Mediation/Storage Services to Enable Command and Control to Simulation Interoperability
The Extensible Battle Management Language project has implemented XML based data mediation services to translate from legacy XML schemas into XML schemas, based on a common tag se...
Andreas Tolk, J. Mark Pullen
ACSD
1998
IEEE
105views Hardware» more  ACSD 1998»
15 years 4 months ago
Visual Formalisms Revisited
The development of an interactive application is a complex task that has to consider data, behavior, intercommunication, architecture and distribution aspects of the modeled syste...
Radu Grosu, Gheorghe Stefanescu, Manfred Broy