Sciweavers

365 search results - page 70 / 73
» Extracting Business Rules from Source Code
Sort
View
89
Voted
ACSAC
2009
IEEE
15 years 4 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
92
Voted
BMCBI
2008
135views more  BMCBI 2008»
14 years 9 months ago
Inferring the role of transcription factors in regulatory networks
Background: Expression profiles obtained from multiple perturbation experiments are increasingly used to reconstruct transcriptional regulatory networks, from well studied, simple...
Philippe Veber, Carito Guziolowski, Michel Le Borg...
76
Voted
BMCBI
2010
84views more  BMCBI 2010»
14 years 9 months ago
Word add-in for ontology recognition: semantic enrichment of scientific literature
Background: In the current era of scientific research, efficient communication of information is paramount. As such, the nature of scholarly and scientific communication is changi...
J. Lynn Fink, Pablo Fernicola, Rahul Chandran, Sav...
WCRE
2006
IEEE
15 years 3 months ago
Animated Visualization of Software History using Evolution Storyboards
The understanding of the structure of a software system can be improved by analyzing the system’s evolution during development. Visualizations of software history that provide o...
Dirk Beyer, Ahmed E. Hassan
MSR
2005
ACM
15 years 3 months ago
Improving evolvability through refactoring
Refactoring is one means of improving the structure of existing software. Locations for the application of refactoring are often based on subjective perceptions such as ”bad sme...
Jacek Ratzinger, Michael Fischer, Harald Gall