Sciweavers

860 search results - page 113 / 172
» Describing Process Patterns with UML
Sort
View
DISCEX
2003
IEEE
15 years 8 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
ITC
2003
IEEE
120views Hardware» more  ITC 2003»
15 years 8 months ago
Test Vector Generation Based on Correlation Model for Ratio-Iddq
For ratio-Iddq testing, the test performance is significantly affected by the correlation between two currents of different input patterns as process parameters vary. In this p...
Xiaoyun Sun, Larry L. Kinney, Bapiraju Vinnakota
IWPC
2003
IEEE
15 years 8 months ago
Understanding Change-Proneness in OO Software through Visualization
During software evolution, adaptive, and corrective maintenance are common reasons for changes. Often such changes cluster around key components. It is therefore important to anal...
James M. Bieman, Anneliese Amschler Andrews, Helen...
DOCENG
2003
ACM
15 years 8 months ago
Accuracy improvement of automatic text classification based on feature transformation
In this paper, we describe a comparative study on techniques of feature transformation and classification to improve the accuracy of automatic text classification. The normalizati...
Guowei Zu, Wataru Ohyama, Tetsushi Wakabayashi, Fu...
DPPI
2003
ACM
15 years 8 months ago
Only when miss universe snatches me: teasing in MMS messaging
When new technology is adopted to everyday life, existing patterns of behavior relevant to the application are transferred to this new media. In this process, some things will als...
Esko Kurvinen