Stem proprietari$ (all stems)
12 papers:
- DATE-2015-CuiZSW #towards #using
- Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
- SANER-2015-CadariuBVD #security
- Tracking known security vulnerabilities in proprietary software systems (MC, EB, JV, AvD), pp. 516–519.
- LCT-NLE-2014-LaugassonK #open source #security
- File Formats Security — Proprietary vs. Open-Source (EL, KK), pp. 63–72.
- SEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process #using
- Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
- ICSM-2012-RamaKVP #detection #source code #version control
- Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
- MSR-2012-IssabayevaNV #performance
- Issue handling performance in proprietary software projects (AI, AN, JV), pp. 209–212.
- ICEIS-v1-2011-PiTX #communication #peer-to-peer
- Solutions for Enabling Communication between Different Proprietary Peer-to-peer Systems (RP, JT, KX), pp. 580–585.
- WCRE-1999-GatrellCH99a #c# #design pattern #replication #using
- Design Patterns and Change Proneness: A Replication Using Proprietary C# Software (MG, SC, TH), pp. 160–164.
- SAC-2009-JohanssonC #comparison #development #enterprise #open source #requirements
- Management of requirements in ERP development: a comparison between proprietary and open source ERP (BJ, RAdC), pp. 1605–1609.
- ASPLOS-2008-ErtveldeE #benchmark #metric
- Dispersing proprietary applications as benchmarks through code mutation (LVE, LE), pp. 201–210.
- ICSM-2007-GustavssonLLMB07a #modelling #open source #xmi
- Integrating proprietary and open-source tool chains through horizontal interchange of XMI models (HG, BL, BL, AM, MB), pp. 521–522.
- ICSM-2001-JongeM #effectiveness #maintenance #tool support
- Cost-Effective Maintenance Tools for Proprietary Languages (MdJ, RM), pp. 240–249.