Sciweavers

7027 search results - page 1265 / 1406
» Software process: a roadmap
Sort
View
108
Voted
SAC
2011
ACM
14 years 2 months ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
108
Voted
SIGMOD
2011
ACM
222views Database» more  SIGMOD 2011»
14 years 2 months ago
Data generation using declarative constraints
We study the problem of generating synthetic databases having declaratively specified characteristics. This problem is motivated by database system and application testing, data ...
Arvind Arasu, Raghav Kaushik, Jian Li
118
Voted
ICDCS
2011
IEEE
13 years 11 months ago
Smart Redundancy for Distributed Computation
Many distributed software systems allow participation by large numbers of untrusted, potentially faulty components on an open network. As faults are inevitable in this setting, th...
Yuriy Brun, George Edwards, Jae Young Bang, Nenad ...

Book
352views
16 years 9 months ago
Object-Oriented Reengineering Patterns
"The documentation is missing or obsolete, and the original developers have departed. Your team has limited understanding of the system, and unit tests are missing for many, i...
Serge Demeyer, Stéphane Ducasse, Oscar Nierstrasz
97
Voted
DAC
2007
ACM
16 years 20 days ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
« Prev « First page 1265 / 1406 Last » Next »