Sciweavers

1273 search results - page 229 / 255
» The data mining approach to automated software testing
Sort
View
AMKM
2003
Springer
15 years 5 months ago
Towards Evaluation of Peer-to-Peer-Based Distributed Knowledge Management Systems
Abstract. Distributed knowledge management systems (DKMS) have been suggested to meet the requirements of today’s knowledge management. Peer-to-peer systems offer technical found...
Marc Ehrig, Christoph Schmitz, Steffen Staab, Juli...
CSMR
2010
IEEE
14 years 6 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
WS
2006
ACM
15 years 5 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
IEEEARES
2010
IEEE
15 years 6 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
SAC
2000
ACM
15 years 4 months ago
The Evolution of the DARWIN System
DARWIN is a web-based system for presenting the results of wind-tunnel testing and computational model analyses to aerospace designers. DARWIN captures the data, maintains the inf...
Joan D. Walton, Robert E. Filman, David J. Korsmey...