Sciweavers

1687 search results - page 69 / 338
» Which pointer analysis should I use
Sort
View
144
Voted
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 10 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
116
Voted
PR
2008
113views more  PR 2008»
15 years 3 months ago
Heart sound as a biometric
In this paper, we investigate the possibility of using heart sound as a biometric for human identification. The most significant contribution of using heart sound as a biometric is...
Koksoon Phua, Jianfeng Chen, Tran Huy Dat, Louis S...
124
Voted
ICST
2009
IEEE
15 years 10 months ago
A Model Building Process for Identifying Actionable Static Analysis Alerts
Automated static analysis can identify potential source code anomalies early in the software process that could lead to field failures. However, only a small portion of static ana...
Sarah Smith Heckman, Laurie A. Williams
125
Voted
COMPUTER
2004
90views more  COMPUTER 2004»
15 years 3 months ago
Languages and the Computing Profession
highly abstracted. The Chinese writing system uses logographs--conventional representations of words or morphemes. Characters of the most common kind have two parts, one suggesting...
W. Neville Holmes
130
Voted
WCRE
2009
IEEE
15 years 10 months ago
The Logical Modularity of Programs
Abstract—The principles and best practices of object oriented design require that modules in a program should match logical decomposition of the knowledge that the program implem...
Daniel Ratiu, Radu Marinescu, Jan Jürjens