Sciweavers

3316 search results - page 533 / 664
» Mining Software Engineering Data
Sort
View
CBSE
2005
Springer
15 years 3 months ago
Unlocking the Grid
The grid has emerged as a novel paradigm that supports seamless cooperation of distributed, heterogeneous computing resources in addressing highly complex computing and data manage...
Chris Mattmann, Nenad Medvidovic, Paul M. Ramirez,...
WILF
2005
Springer
86views Fuzzy Logic» more  WILF 2005»
15 years 3 months ago
Intelligent Track Analysis on Navy Platforms Using Soft Computing
We have developed and continue to enhance automated intelligent software that performs the tasks and decision making which now occurs by the personnel manning watch stations in the...
Robert Richards, Richard Stottler, Ben Ball, Cosku...
ISSTA
2004
ACM
15 years 3 months ago
Where the bugs are
The ability to predict which files in a large software system are most likely to contain the largest numbers of faults in the next release can be a very valuable asset. To accomp...
Thomas J. Ostrand, Elaine J. Weyuker, Robert M. Be...
ISSRE
2003
IEEE
15 years 3 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
JCS
2002
115views more  JCS 2002»
14 years 9 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis