Sciweavers

639 search results - page 73 / 128
» About Norms and Causes
Sort
View
ICST
2009
IEEE
15 years 6 months ago
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction
Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software...
Fadi Wedyan, Dalal Alrmuny, James M. Bieman
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 6 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
IFIP
2009
Springer
15 years 6 months ago
Network Awareness in P2P-TV Applications
The increasing popularity of applications for video-streaming based on P2P paradigm (P2P-TV) is raising the interest of both broadcasters and network operators. The former see a pr...
Stefano Traverso, Emilio Leonardi, Marco Mellia, M...
MHCI
2009
Springer
15 years 6 months ago
Industrial case study of the MICA support system for warehouse workers
Returns caused by the delivery of incorrect items constitute a major problem for non-automated warehouses. Returns not only create extra costs, they also aggravate customers. Most...
Christian Prause, Markus Eisenhauer, Lukas Gillman...
ACMACE
2009
ACM
15 years 6 months ago
Funbrella: recording and replaying vibrations through an umbrella axis
We propose an umbrella-like device called Funbrella that entertains people with many types of rain by focusing on an umbrella as a user interface that connects humans and rain. Ge...
Kazuyuki Fujita, Yuichi Itoh, Ai Yoshida, Maya Oza...