Sciweavers

418 search results - page 63 / 84
» GUI Inspection from Source Code Analysis
Sort
View
72
Voted
ACMSE
2004
ACM
15 years 1 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
79
Voted
PVLDB
2008
118views more  PVLDB 2008»
14 years 9 months ago
Column-store support for RDF data management: not all swans are white
This paper reports on the results of an independent evaluation of the techniques presented in the VLDB 2007 paper "Scalable Semantic Web Data Management Using Vertical Partit...
Lefteris Sidirourgos, Romulo Goncalves, Martin L. ...
HPDC
2000
IEEE
15 years 1 months ago
CAVEStudy: An Infrastructure for Computational Steering in Virtual Reality Environments
We present the CAVEStudy system that enables scientists to interactively steer a simulation from a virtual reality (VR) environment. No modification to the source code is necessa...
Luc Renambot, Henri E. Bal, Desmond Germans, Hans ...
DCC
2011
IEEE
14 years 4 months ago
Scalar Quantization for Relative Error
Quantizers for probabilistic sources are usually optimized for mean-squared error. In many applications, maintaining low relative error is a more suitable objective. This measure ...
John Z. Sun, Vivek K. Goyal
IADIS
2003
14 years 11 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...