Sciweavers

828 search results - page 139 / 166
» A framework for spyware assessment
Sort
View
ICSE
2009
IEEE-ACM
15 years 6 months ago
The Compliance Testing of Software Tools with Respect to the UML Standards Specification - The ArgoUML Case Study
In ICSE’08 we demonstrated the Java UML Lightweight Enumerator (JULE) tool, which supports compliance test generation from modeling standards specifications. When employed in ou...
Panuchart Bunyakiati, Anthony Finkelstein
123
Voted
TES
2001
Springer
15 years 6 months ago
Peer-to-Peer Traced Execution of Composite Services
Abstract. The connectivity generated by the Internet is opening unprecedented opportunities of automating business-to-business collaborations. As a result, organisations of all siz...
Marie-Christine Fauvet, Marlon Dumas, Boualem Bena...
CPE
2000
Springer
292views Hardware» more  CPE 2000»
15 years 6 months ago
SREPT: Software Reliability Estimation and Prediction Tool
Abstract. Several tools have been developed for the estimation of software reliability. However, they are highly specialized in the approaches they implement and the particular pha...
Srinivasan Ramani, Kishor S. Trivedi
ITNG
2010
IEEE
15 years 6 months ago
Provenance Collection in Reservoir Management Workflow Environments
There has been a recent push towards applying information technology principles, such as workflows, to bring greater efficiency to reservoir management tasks. These workflows are d...
Fan Sun, Jing Zhao, Karthik Gomadam, Viktor K. Pra...
VRST
1999
ACM
15 years 6 months ago
Testbed evaluation of virtual environment interaction techniques
As immersive virtual environment (VE) applications become more complex, it is clear that we need a rm understanding of the principles of VE interaction. In particular, designers n...
Doug A. Bowman, Donald B. Johnson, Larry F. Hodges