Stem proprietari$ (all stems)
12 papers:
DATE-2015-CuiZSW #towards #using- Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
SANER-2015-CadariuBVD #security- Tracking known security vulnerabilities in proprietary software systems (MC, EB, JV, AvD), pp. 516–519.
LCT-NLE-2014-LaugassonK #open source #security- File Formats Security — Proprietary vs. Open-Source (EL, KK), pp. 63–72.
SEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process #using- Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
ICSM-2012-RamaKVP #detection #source code #version control- Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
MSR-2012-IssabayevaNV #performance- Issue handling performance in proprietary software projects (AI, AN, JV), pp. 209–212.
ICEIS-v1-2011-PiTX #communication #peer-to-peer- Solutions for Enabling Communication between Different Proprietary Peer-to-peer Systems (RP, JT, KX), pp. 580–585.
WCRE-1999-GatrellCH99a #c# #design pattern #replication #using- Design Patterns and Change Proneness: A Replication Using Proprietary C# Software (MG, SC, TH), pp. 160–164.
SAC-2009-JohanssonC #comparison #development #enterprise #open source #requirements- Management of requirements in ERP development: a comparison between proprietary and open source ERP (BJ, RAdC), pp. 1605–1609.
ASPLOS-2008-ErtveldeE #benchmark #metric- Dispersing proprietary applications as benchmarks through code mutation (LVE, LE), pp. 201–210.
ICSM-2007-GustavssonLLMB07a #modelling #open source #xmi- Integrating proprietary and open-source tool chains through horizontal interchange of XMI models (HG, BL, BL, AM, MB), pp. 521–522.
ICSM-2001-JongeM #effectiveness #maintenance #tool support- Cost-Effective Maintenance Tools for Proprietary Languages (MdJ, RM), pp. 240–249.