Sciweavers

2777 search results - page 409 / 556
» Understanding ontological engineering
Sort
View
IDTRUST
2010
ACM
15 years 11 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
FASE
2010
Springer
15 years 11 months ago
Are Popular Classes More Defect Prone?
Traces of the evolution of software systems are left in a number of different repositories: such as configuration management systems, bug tracking systems, mailing lists. Develope...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza
CGO
2009
IEEE
15 years 11 months ago
OptiScope: Performance Accountability for Optimizing Compilers
Compilers employ many aggressive code transformations to achieve highly optimized code. However, because of complex target architectures and unpredictable optimization interaction...
Tipp Moseley, Dirk Grunwald, Ramesh Peri
ISPASS
2009
IEEE
15 years 11 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...
ICSE
2009
IEEE-ACM
15 years 11 months ago
Succession: Measuring transfer of code and developer productivity
Code ownership transfer or succession is a crucial ingredient in open source code reuse and in offshoring projects. Measuring succession can help understand factors that affect ...
Audris Mockus