Sciweavers

7941 search results - page 14 / 1589
» Network Analysis of Repositories
Sort
View
71
Voted
OSDI
2004
ACM
15 years 9 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
MSR
2009
ACM
15 years 2 months ago
MapReduce as a general framework to support research in Mining Software Repositories (MSR)
Researchers continue to demonstrate the benefits of Mining Software Repositories (MSR) for supporting software development and research activities. However, as the mining process...
Weiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E....
101
Voted
ESWA
2011
245views Database» more  ESWA 2011»
14 years 4 months ago
APROMORE: An advanced process model repository
Business process models are becoming available in large numbers due to their popular use in many industrial applications such as enterprise and quality engineering projects. On th...
Marcello La Rosa, Hajo A. Reijers, Wil M. P. van d...
89
Voted
CIMCA
2008
IEEE
15 years 4 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
76
Voted
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 1 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock