Sciweavers

1257 search results - page 125 / 252
» Open Source Requirements Engineering
Sort
View
117
Voted
CAISE
2003
Springer
15 years 8 months ago
Processing Queries in a Large Peer-to-Peer System
While current search engines seem to easily handle the size of the data available on the Internet, they cannot provide fresh results. The most up-to-date data always resides on the...
Leonidas Galanis, Yuan Wang, Shawn R. Jeffery, Dav...
142
Voted
CIMCA
2008
IEEE
15 years 10 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 9 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
155
Voted
PROFES
2004
Springer
15 years 8 months ago
Refactoring Support Based on Code Clone Analysis
Abstract. Software maintenance is the most expensive activity in software development. Many software companies spent a large amount of cost to maintain the existing software system...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
ICIP
2009
IEEE
15 years 1 months ago
Semantic keyword extraction via adaptive text binarization of unstructured unsourced video
We propose a fully automatic method for summarizing and indexing unstructured presentation videos based on text extracted from the projected slides. We use changes of text in the ...
Michele Merler, John R. Kender