Sciweavers

1036 search results - page 202 / 208
» Report on INEX 2009
Sort
View
ISSTA
2010
ACM
14 years 11 months ago
The Google FindBugs fixit
In May 2009, Google conducted a company wide FindBugs “fixit”. Hundreds of engineers reviewed thousands of FindBugs warnings, and fixed or filed reports against many of the...
Nathaniel Ayewah, William Pugh
ICETE
2004
253views Business» more  ICETE 2004»
14 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
84
Voted
AIME
2009
Springer
14 years 10 months ago
Learning Approach to Analyze Tumour Heterogeneity in DCE-MRI Data During Anti-cancer Treatment
Abstract. The paper proposes a learning approach to support medical researchers in the context of in-vivo cancer imaging, and specifically in the analysis of Dynamic Contrast-Enhan...
Alessandro Daducci, Umberto Castellani, Marco Cris...
BCSHCI
2009
14 years 10 months ago
An exploratory study of tag-based visual interfaces for searching folksonomies
Aesthetic features such as animation, 3D interaction, and visual metaphors are becoming commonplace in multimedia search interfaces. However, it is unclear which attributes are ne...
Javier Diaz, Keyun Hu, Melanie Tory
BPSC
2009
190views Business» more  BPSC 2009»
14 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann