Sciweavers

5544 search results - page 887 / 1109
» Three Inadequate Models
Sort
View
128
Voted
CSR
2008
Springer
15 years 5 months ago
From Invariants to Canonization in Parallel
A function f of a graph is called a complete graph invariant if two given graphs G and H are isomorphic exactly when f(G) = f(H). If additionally, f(G) is a graph isomorphic to G, ...
Johannes Köbler, Oleg Verbitsky
154
Voted
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
15 years 5 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
124
Voted
EDBT
2008
ACM
160views Database» more  EDBT 2008»
15 years 5 months ago
Taxonomy-superimposed graph mining
New graph structures where node labels are members of hierarchically organized ontologies or taxonomies have become commonplace in different domains, e.g., life sciences. It is a ...
Ali Cakmak, Gultekin Özsoyoglu
125
Voted
ELPUB
2008
ACM
15 years 5 months ago
The Role of Academic Libraries in Building Open Communities of Scholars
This paper describes three important pillars of publishing programs emerging at university libraries: providing a robust publishing platform, engaging the academic community in di...
Kevin Stranack, Gwen Bird, Rea Devakos
137
Voted
ESEM
2008
ACM
15 years 5 months ago
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques
Benchmarks provide an experimental basis for evaluating software engineering processes or techniques in an objective and repeatable manner. We present the FAULTBENCH v0.1 benchmar...
Sarah Smith Heckman, Laurie Williams