Sciweavers

1257 search results - page 218 / 252
» Open Source Requirements Engineering
Sort
View
PLDI
2009
ACM
16 years 14 days ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
JCDL
2006
ACM
161views Education» more  JCDL 2006»
15 years 5 months ago
Learning metadata from the evidence in an on-line citation matching scheme
Citation matching, or the automatic grouping of bibliographic references that refer to the same document, is a data management problem faced by automatic digital libraries for sci...
Isaac G. Councill, Huajing Li, Ziming Zhuang, Sand...
ECBS
2009
IEEE
114views Hardware» more  ECBS 2009»
15 years 3 months ago
Model-Based Product-Oriented Certification
Future space missions such as the Mars Science Laboratory and Project Constellation suggest the engineering of some of the most complex man-rated software systems. The present pro...
Damian Dechev, Bjarne Stroustrup
ICDE
2005
IEEE
119views Database» more  ICDE 2005»
16 years 1 months ago
Data Triage: An Adaptive Architecture for Load Shedding in TelegraphCQ
Many of the data sources used in stream query processing are known to exhibit bursty behavior. Data in a burst often has different characteristics than steady-state data, and ther...
Frederick Reiss, Joseph M. Hellerstein
WWW
2009
ACM
16 years 15 days ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong