Sciweavers

34 search results - page 7 / 7
» Identification of defect-prone classes in telecommunication ...
Sort
View
EWC
2002
86views more  EWC 2002»
13 years 6 months ago
On Object-Oriented Frameworks and Coordinate Free Formulations of PDEs
An object-oriented (OO) framework for Partial tial Equations (PDEs) provides software abstractions for numerical simulation of PDEs. The design of such frameworks is not trivial, a...
Magne Haveraaen, Hans Z. Munthe-Kaas, Krister &Ari...
AIM
2006
13 years 7 months ago
Observing the use of BPM tools: A step towards flexibility
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...
Joseph Heili, Jean-Mathias Heraud, Laure France
ACSAC
2010
IEEE
13 years 4 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
IWPSE
2005
IEEE
13 years 12 months ago
EvoLens: Lens-View Visualizations of Evolution Data
Visualizing software evolution is essential for identifying design erosions that have occurred over the past releases. Making evolutionary aspects explicit via visual representati...
Jacek Ratzinger, Michael Fischer, Harald Gall