Sciweavers

1257 search results - page 218 / 252
» Open Source Requirements Engineering
Sort
View
PLDI
2009
ACM
16 years 5 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
JCDL
2006
ACM
161views Education» more  JCDL 2006»
15 years 11 months ago
Learning metadata from the evidence in an on-line citation matching scheme
Citation matching, or the automatic grouping of bibliographic references that refer to the same document, is a data management problem faced by automatic digital libraries for sci...
Isaac G. Councill, Huajing Li, Ziming Zhuang, Sand...
ECBS
2009
IEEE
114views Hardware» more  ECBS 2009»
15 years 8 months ago
Model-Based Product-Oriented Certification
Future space missions such as the Mars Science Laboratory and Project Constellation suggest the engineering of some of the most complex man-rated software systems. The present pro...
Damian Dechev, Bjarne Stroustrup
ICDE
2005
IEEE
119views Database» more  ICDE 2005»
16 years 6 months ago
Data Triage: An Adaptive Architecture for Load Shedding in TelegraphCQ
Many of the data sources used in stream query processing are known to exhibit bursty behavior. Data in a burst often has different characteristics than steady-state data, and ther...
Frederick Reiss, Joseph M. Hellerstein
WWW
2009
ACM
16 years 5 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong