Abstract. This paper presents first steps towards building a music information system like last.fm, but with the major difference that the data is automatically retrieved from the ...
Markus Schedl, Peter Knees, Tim Pohle, Gerhard Wid...
The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the proto...
In this survey we review energy-aware routing protocols for wireless multihop ad hoc networks and critically discuss the main results in this area. The classification presented is...
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
In this paper, we present a collection of aspect-oriented refactorings covering both the extraction of aspects from objectoriented legacy code and the subsequent tidying up of the...