Sciweavers

834 search results - page 150 / 167
» Research Documentation Guidelines - Capturing knowledge, imp...
Sort
View
108
Voted
EUROCRYPT
2003
Springer
15 years 5 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
WCRE
1995
IEEE
15 years 3 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
IJMMS
2007
173views more  IJMMS 2007»
14 years 11 months ago
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsin...
VLDB
2002
ACM
264views Database» more  VLDB 2002»
14 years 11 months ago
Viator - A Tool Family for Graphical Networking and Data View Creation
Web-based data sources, particularly in Life Sciences, grow in diversity and volume. Most of the data collections are equipped with common document search, hyperlink and retrieval...
Stephan Heymann, Katja Tham, Axel Kilian, Gunnar W...
100
Voted
ICSE
2010
IEEE-ACM
14 years 9 months ago
Identifying crosscutting concerns using historical code changes
Detailed knowledge about implemented concerns in the source code is crucial for the cost-effective maintenance and successful evolution of large systems. Concern mining techniques...
Bram Adams, Zhen Ming Jiang, Ahmed E. Hassan