Sciweavers

365 search results - page 47 / 73
» Extracting Business Rules from Source Code
Sort
View
ACSAC
2008
IEEE
15 years 6 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
BMCBI
2005
153views more  BMCBI 2005»
14 years 11 months ago
Learning Statistical Models for Annotating Proteins with Function Information using Biomedical Text
Background: The BioCreative text mining evaluation investigated the application of text mining methods to the task of automatically extracting information from text in biomedical ...
Soumya Ray, Mark Craven
ICST
2009
IEEE
14 years 9 months ago
A Flexible Framework for Quality Assurance of Software Artefacts with Applications to Java, UML, and TTCN-3 Test Specifications
Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefac...
Jens Nodler, Helmut Neukirchen, Jens Grabowski
FASE
2007
Springer
15 years 6 months ago
Contract-Driven Development
Although unit tests are recognized as an important tool in software development, programmers prefer to write code, rather than unit tests. Despite the emergence of tools like JUni...
Bertrand Meyer
ICPPW
2006
IEEE
15 years 5 months ago
Multidimensional Dataflow-based Parallelization for Multimedia Instruction Set Extensions
In retargeting loop-based code for multimedia instruction set extensions, a critical issue is that vector data types of mixed precision within a loop body complicate the paralleli...
Lewis B. Baumstark Jr., Linda M. Wills