Sciweavers

630 search results - page 26 / 126
» The Future Is Not Assured - But It Should Be
Sort
View
118
Voted
WCRE
2003
IEEE
15 years 7 months ago
Problems Creating Task-relevant Clone Detection Reference Data
One prevalent method for evaluating the results of automated software analysis tools is to compare the tools’ output to the judgment of human experts. This evaluation strategy i...
Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yan...
129
Voted
ACSAC
2004
IEEE
15 years 5 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
ICSE
2000
IEEE-ACM
15 years 5 months ago
Simulation in software engineering training
Simulation is frequently used for training in many application areas like aviation and economics, but not in software engineering. We present the SESAM project which focuses on so...
Anke Drappa, Jochen Ludewig
ECIS
2003
15 years 3 months ago
Evaluating the effectiveness of learning interventions: an information systems case study
Currently, there is no standard instrument for evaluating learning effectiveness. While final examinations and end-of-semester course evaluation surveys can be used to do this, th...
Daniel L. Moody, Guttorm Sindre
WSC
2001
15 years 3 months ago
Security issues in high level architecture based distributed simulation
The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Di...
Asa Elkins, Jeffery W. Wilson, Denis Gracanin