Sciweavers

4636 search results - page 689 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
NDSS
2008
IEEE
15 years 5 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
RTAS
2005
IEEE
15 years 4 months ago
Convoy Driving through Ad-Hoc Coalition Formation
— Convoy driving on public highways is a useful phenomena which increases the safety and the throughput of the highway. We present an approach through which a wireless Convoy Dri...
Majid Ali Khan, Ladislau Bölöni
ICCV
2003
IEEE
16 years 1 months ago
Surface Reconstruction by Integrating 3D and 2D Data of Multiple Views
Surface representation is needed for almost all modeling and visualization applications, but unfortunately, 3D data from a passive vision system are often insufficient for a tradi...
Maxime Lhuillier, Long Quan
ICRE
1996
IEEE
15 years 3 months ago
Structuring utterance records of requirements elicitation meetings based on speech act theory
This paper discusses a technique to structure utterance records of the meetings for requirements elicitation based on speech act theory. To elicit requirements to the system to be...
Motoshi Saeki, Kinji Matsumura, Jun'ichi Shimoda, ...
COMPSAC
2009
IEEE
15 years 6 months ago
An Economical Approach to Usability Testing
Many software engineers consider usability testing as one of the more expensive, tedious and least rewarding tests to implement. Making usability testing less expensive and more r...
Carl J. Mueller, Dan E. Tamir, Oleg V. Komogortsev...