Sciweavers

2830 search results - page 326 / 566
» A Development Tool for E-learning Applications
Sort
View
92
Voted
ACSAC
2002
IEEE
15 years 3 months ago
A Toolkit for Detecting and Analyzing Malicious Software
In this paper we present PEAT: The Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to ex...
Michael Weber, Matthew Schmid, Michael Schatz, Dav...
IWANN
2009
Springer
15 years 3 months ago
A Soft Computing System to Perform Face Milling Operations
In this paper we present a soft computing system developed to optimize the face milling operation under High Speed conditions in the manufacture of steel components like molds with...
Raquel Redondo, Pedro Santos, Andrés Bustil...
67
Voted
TOOLS
2000
IEEE
15 years 3 months ago
Design and Implementation of CORBA-Based Subscription Server
The standard CORBA operation invocation model supports synchronous, one-way, and deferred synchronous interactions between clients and servers. However, this model is too restrict...
R. Maheshwari, R. Fatoohi
73
Voted
TOOLS
1997
IEEE
15 years 3 months ago
Mapping the OO-Jacobson Approach into Function Point Analysis
Function Point Analysis measures user requested functionality independent of the technology used for implementation. Software applications are represented stract model that contai...
T. Fetcke, A. Abran, T.-H. Nguyen
105
Voted
FM
2006
Springer
133views Formal Methods» more  FM 2006»
15 years 2 months ago
Enforcer - Efficient Failure Injection
Non-determinism of the thread schedule is a well-known problem in concurrent programming. However, other sources of non-determinism exist which cannot be controlled by an applicati...
Cyrille Artho, Armin Biere, Shinichi Honiden