Sciweavers

405 search results - page 25 / 81
» Avatar-centric Risk Evaluation
Sort
View
ECBS
2006
IEEE
90views Hardware» more  ECBS 2006»
15 years 3 months ago
Evaluating Alternatives for Architecture-Oriented Refactoring
Refactoring of software systems represents an fundamental way of improving their quality properties. Large-scale refactoring has to be performed at an architectural level to execu...
Sven Wohlfarth, Matthias Riebisch
IEEECIT
2006
IEEE
15 years 3 months ago
The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project
This paper argues about the partitioning in hardware/software co-design and suggests the methodology applying extreme programming to complement the co-design. This approach, contr...
Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter...
SEC
2007
14 years 11 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser
ICPR
2010
IEEE
14 years 7 months ago
An Optimum Class-Rejective Decision Rule and Its Evaluation
Decision-making systems intend to copy human reasoning which often consists in eliminating highly non probable situations (e.g. diseases, suspects) rather than selecting the most r...
Hoel Le Capitaine, Carl Frélicot
RCIS
2010
14 years 7 months ago
Using Software Metrics in the Evaluation of a Conceptual Component Model
Every interactive system has a functional part and an interactive part. However the software engineering and the human-computer-interaction communities work separately in terms of ...
Eric Ceret, Sophie Dupuy-Chessa, Guillaume Godet-B...