Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

SeaMonkey

Known as: SeaMonkey Composer, SeaMonkey Suite, Mozilla seaMonkey 
SeaMonkey is a free and open-source Internet suite. It is the continuation of the former Mozilla Application Suite, based on the same source code… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2018
2018
Bug triaging is a process to decide what to do with newly coming bug reports. In this paper, we have mined association rules for… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
2017
2017
Software defect in today’s era is crucial in the field of software engineering. Most of the organisations use various techniques… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2015
2015
Many recent software engineering papers have examined duplicate issue reports. Thus far, duplicate reports have been considered a… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2014
2014
The metrics can be applied by software maintenance, testing and evolution teams for a variety of purposes. Various research… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Predicting bug-fix time is useful in several areas of software evolution, such as predicting software quality or coordinating… Expand
  • table 1
  • table 2
  • figure 1
Is this relevant?
2011
2011
The process of fixing software bugs plays a key role in the maintenance activities of a software project. Ideally, code ownership… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2011
2011
Attack trees and attack graphs are a well-known representation for computer security vulnerabilities. They capture how malicious… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Internet, Mozilla: Altere Firefox, Thunderbird und Seamonkey Meldungen, Internet Software, Empfehlung,Download,Mozilla,Firefox… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper discusses technology integration in teaching and teacher education. Emphasis is placed on policy and curriculum reform… Expand
Is this relevant?