Sciweavers

2259 search results - page 316 / 452
» Leveraging Distributed Software Development
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
Recommending random walks
We improve on previous recommender systems by taking advantage of the layered structure of software. We use a random-walk approach, mimicking the more focused behavior of a develo...
Zachary M. Saul, Vladimir Filkov, Premkumar T. Dev...
APSEC
2006
IEEE
15 years 10 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
ASWEC
2006
IEEE
15 years 10 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
ECLIPSE
2006
ACM
15 years 10 months ago
Visualization of clone detection results
The goal of a clone detection tool is to identify sections of code that are duplicated in a program. The result of the detection is presented in some manner for the user to view, ...
Robert Tairas, Jeff Gray, Ira D. Baxter
JCDL
2004
ACM
107views Education» more  JCDL 2004»
15 years 10 months ago
A semi-automated digital preservation system based on semantic web services
This paper describes a Web-services-based system which we have developed to enable organizations to semi-automatically preserve their digital collections by dynamically discoverin...
Jane Hunter, Sharmin Choudhury