Sciweavers

3316 search results - page 452 / 664
» Mining Software Engineering Data
Sort
View
B
2007
Springer
15 years 5 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
91
Voted
ICESS
2007
Springer
15 years 5 months ago
An Analyzer of the User Event for Interactive DMB
Abstract. The interactive digital multimedia broadcasting stands for a convergence application between digital multimedia broadcasting service and wireless internet service. It dev...
Hlaing Su Khin, Sangwook Kim
113
Voted
AGILEDC
2004
IEEE
15 years 5 months ago
Emergent Database Design: Liberating Database Development with Agile Practices
Many agile projects do not apply agile practices to their database development. Common wisdom dictates that the entire data model be carefully designed up front and protected from...
Alan Harriman, Paul Hodgetts, Mike Leo
ASWEC
2004
IEEE
15 years 5 months ago
ASPIRE: Automated Systematic Protocol Implementation Robustness Evaluation
Network protocol implementations are susceptible to problems caused by their lack of ability to handle invalid inputs. We present ASPIRE: Automated Systematic Protocol Implementat...
Arunchandar Vasan, Atif M. Memon
EDBTW
2006
Springer
15 years 5 months ago
Efficiently Processing XML Queries over Fragmented Repositories with PartiX
The data volume of XML repositories and the response time of query processing have become critical issues for many applications, especially for those in the Web. An interesting alt...
Alexandre Andrade, Gabriela Ruberg, Fernanda Arauj...