Buscar
Mostrando ítems 1-4 de 4
Artículo
Searching for rules to detect defective modules: A subgroup discovery approach
(Elsevier, 2012)
Data mining methods in software engineering are becoming increasingly important as they can support several aspects of the software development life-cycle such as quality. In this work, we present a data mining approach ...
Artículo
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
(Elsevier, 2012)
Design, development, and maintenance of firewall ACLs are very hard and error-prone tasks. Two of the reasons for these difficulties are, on the one hand, the big gap that exists between the access control requirements ...
Artículo
PolaritySpam: Propagating Content-based Information Through a Web-Graph to Detect Web Spam
(ICIC International, 2012)
Spam web pages have become a problem for Information Retrieval systems due to the negative effects that this phenomenon can cause in their results. In this work we tackle the problem of detecting these pages with a ...
Artículo
A proposal to detect errors in Enterprise Application Integration solutions
(ScienceDirect, 2012-03)
EnterpriseApplication Integration (EAI) solutions comprise a set of specific-purpose processes thatimple ment exogenous message workflows. The goal is to keep a number of applications’ data in synchrony or to develop new ...