Sciweavers

1726 search results - page 128 / 346
» Traits: Tools and Methodology
Sort
View
ISESE
2006
IEEE
15 years 4 months ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili
NORDICHI
2006
ACM
15 years 4 months ago
Systematic evaluation of e-learning systems: an experimental validation
The evaluation of e-learning applications deserves special attention and evaluators need effective methodologies and appropriate guidelines to perform their task. We have proposed...
Carmelo Ardito, Maria Francesca Costabile, Antonel...
ASIAN
2005
Springer
115views Algorithms» more  ASIAN 2005»
15 years 3 months ago
Practical Ontology Systems for Enterprise Application
One of the main challenges in building enterprise applications has been to balance between built-in functionality and domain/scenario-specific customization. The lack of formal way...
Dongkyu Kim, Sang-goo Lee, Junho Shim, Jonghoon Ch...
SIGSOFT
2009
ACM
15 years 2 months ago
Qos-driven runtime adaptation of service oriented architectures
Runtime adaptation is recognized as a viable way for a serviceoriented system to meet QoS requirements in its volatile operating environment. In this paper we propose a methodolog...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...