Sciweavers

2826 search results - page 180 / 566
» A resource-based analysis of IT sourcing
Sort
View
132
Voted
COMPSAC
2008
IEEE
15 years 3 months ago
Decision Support for User Interface Design: Usability Diagnosis by Time Analysis of the User Activity
This paper presents a methodology for setting up a Decision Support system for User Interface Design (DSUID). We first motivate the role and contributions of DSUID and then demons...
Avi Harel, Ron S. Kenett, Fabrizio Ruggeri
92
Voted
MASCOTS
2007
15 years 3 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon
103
Voted
SEC
2008
15 years 3 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti
CORR
2010
Springer
137views Education» more  CORR 2010»
15 years 2 months ago
Verification of Java Bytecode using Analysis and Transformation of Logic Programs
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including terminat...
Elvira Albert, Miguel Gómez-Zamalloa, Laure...
IANDC
2008
128views more  IANDC 2008»
15 years 1 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...