Sciweavers

365 search results - page 40 / 73
» Extracting Business Rules from Source Code
Sort
View
SCAM
2007
IEEE
15 years 6 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten
LREC
2008
130views Education» more  LREC 2008»
15 years 1 months ago
Encoding Terms from a Scientific Domain in a Terminological Database: Methodology and Criteria
This paper reports on the main phases of a research which aims at enhancing a maritime terminological database by means of a set of terms belonging to meteorology. The structure o...
Rita Marinelli, Melissa Tiberi, Remo Bindi
ACSAC
2006
IEEE
15 years 5 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
ANLP
1997
137views more  ANLP 1997»
15 years 1 months ago
Probabilistic and Rule-Based Tagger of an Inflective Language- a Comparison
We present results of probabilistic tagging of Czech texts in order to show how these techniques work for one of the highly morphologically ambiguous inflective languages. After d...
Jan Hajic, Barbora Hladká
85
Voted
CIKM
2005
Springer
15 years 5 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...