Sciweavers

328 search results - page 32 / 66
» Requirements Inheritance in Continuous Requirements Engineer...
Sort
View
96
Voted
ACTAC
2002
102views more  ACTAC 2002»
14 years 10 months ago
Handling Pointers and Unstructured Statements in the Forward Computed Dynamic Slice Algorithm
Different program slicing methods are used for debugging, testing, reverse engineering and maintenance. Slicing algorithms can be classified as a static slicing or dynamic slicing...
Csaba Faragó, Tamás Gergely
78
Voted
SIGUCCS
2003
ACM
15 years 4 months ago
Deep in the heart of client services: it's not just about hardware and software
“Client Services”, “User Services”, “Customer Service”: whatever we call it at our various colleges and universities, it’s not just about fixing hardware and softwar...
Cynthia A. Murnan
68
Voted
WWW
2009
ACM
15 years 11 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
ICRA
2002
IEEE
127views Robotics» more  ICRA 2002»
15 years 3 months ago
Design and Control of a Three-Link Serial Manipulator for Lessons in Particle Dynamics
Design, control, and performance of a ball-throwing robot are examined in this paper. The objective of this project is to provide an interactive ball-throwing robotic arm for illu...
Mark A. Minor, Kent Jensen, Youngshik Kim
102
Voted
SIGSOFT
2003
ACM
15 years 11 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler