Sciweavers

365 search results - page 57 / 73
» Extracting Business Rules from Source Code
Sort
View
COMPUTER
2000
180views more  COMPUTER 2000»
14 years 11 months ago
The Challenges of Automatic Summarization
tion--the art of abstracting key content from one or more information sources--has become an integral part of everyday life. People keep abreast of world affairs by listening to ne...
Udo Hahn, Inderjeet Mani
PLDI
2010
ACM
15 years 9 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
CORR
2010
Springer
166views Education» more  CORR 2010»
14 years 11 months ago
A CHAID Based Performance Prediction Model in Educational Data Mining
The performance in higher secondary school education in India is a turning point in the academic lives of all students. As this academic performance is influenced by many factors,...
M. Ramaswami, R. Bhaskaran
SBACPAD
2005
IEEE
110views Hardware» more  SBACPAD 2005»
15 years 5 months ago
Portable checkpointing and communication for BSP applications on dynamic heterogeneous Grid environments
Executing long-running parallel applications in Opportunistic Grid environments composed of heterogeneous, shared user workstations, is a daunting task. Machines may fail, become ...
Raphael Y. de Camargo, Fabio Kon, Alfredo Goldman
ICSE
1998
IEEE-ACM
15 years 3 months ago
A Model of Noisy Software Engineering Data (Status Report)
other projects in the database. Software development data is highly variable, which often result,s in underlying trends being hidden. In order to address this problem, a method of ...
Roseanne Tesoriero, Marvin V. Zelkowitz