Java has emerged as one of the most dynamic programming languages today. During the past eight years it has become a leading choice as the programming language for an introductory...
This paper presents a specification-driven approach to test automation for GUI-based JAVA programs as an alternative to the use of capture/replay. The NetBeans Jemmy library provi...
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Usability has often been sold as the silver bullet for solving the problems of unprofitable online stores. Although better usability will generally improve these sites and their p...
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
This paper presents a distributed multi-robot system designed to solve a team-based search and destroy task. The project was divided into two phases. The initial phase was used to...
J. T. McClain, Bradley J. Wimpey, D. H. Barnhard, ...
Sensor networks consist of resource-constrained sensors operating in a variety of environments. Given the severe constraints on these sensors, it is a particularly challenging pro...
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
Component-based software development has become an important approach to building complex software systems. Much research focuses on component specification to achieve the advanta...