Sciweavers

84 search results - page 6 / 17
» Gathering Experience Knowledge from Iterative Software Devel...
Sort
View
ICSM
2003
IEEE
15 years 2 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
15 years 2 months ago
Active knowledge: dynamically enriching RDF knowledge bases by web services
The proliferation of knowledge-sharing communities and the advances in information extraction have enabled the construction of large knowledge bases using the RDF data model to re...
Nicoleta Preda, Gjergji Kasneci, Fabian M. Suchane...
AGILEDC
2005
IEEE
15 years 3 months ago
Agile Metrics at the Israeli Air Force
It is a significant challenge to implement and research agile software development methods in organizations such as the army. Since it differs from organizations in the industry a...
Yael Dubinsky, David Talby, Orit Hazzan, Arie Kere...
BMCBI
2007
99views more  BMCBI 2007»
14 years 9 months ago
The Deuterator: software for the determination of backbone amide deuterium levels from H/D exchange MS data
Background: The combination of mass spectrometry and solution phase amide hydrogen/deuterium exchange (H/D exchange) experiments is an effective method for characterizing protein ...
B. D. Pascal, M. J. Chalmers, S. A. Busby, C. C. M...
SIGCSE
2002
ACM
218views Education» more  SIGCSE 2002»
14 years 9 months ago
Participatory design in a human-computer interaction course: teaching ethnography methods to computer scientists
Empirical evidence shows the ability for computer technology to deliver on its promises of enhancing our quality of life relies on how well the application fits our understanding ...
Jerry B. Weinberg, Mary L. Stephen