Sciweavers

8177 search results - page 1417 / 1636
» Detecting System Emulators
Sort
View
ICSE
2007
IEEE-ACM
16 years 4 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
135
Voted
ICSE
2007
IEEE-ACM
16 years 4 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
ICDE
2010
IEEE
292views Database» more  ICDE 2010»
16 years 3 months ago
Usher: Improving Data Quality With Dynamic Forms
Data quality is a critical problem in modern databases. Data entry forms present the first and arguably best opportunity for detecting and mitigating errors, but there has been li...
Kuang Chen, Harr Chen, Neil Conway, Joseph M. Hell...
MOBISYS
2007
ACM
16 years 3 months ago
Radio interferometric tracking of mobile wireless nodes
Location-awareness is an important requirement for many mobile wireless applications today. When GPS is not applicable because of the required precision and/or the resource constr...
Branislav Kusy, János Sallai, György B...
MOBISYS
2005
ACM
16 years 3 months ago
WALRUS: wireless acoustic location with room-level resolution using ultrasound
In this paper, we propose a system that uses the wireless networking and microphone interfaces of mobile devices to determine location to room-level accuracy. The wireless network...
Gaetano Borriello, Alan L. Liu, Tony Offer, Christ...
« Prev « First page 1417 / 1636 Last » Next »