Sciweavers

1523 search results - page 92 / 305
» Detecting and Sketching the Common
Sort
View
IEEEIAS
2009
IEEE
15 years 4 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
REFSQ
2009
Springer
15 years 4 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
ESEM
2009
ACM
15 years 4 months ago
Scope error detection and handling concerning software estimation models
Over the last 25+ years, the software community has been searching for the best models for estimating variables of interest (e.g., cost, defects, and fault proneness). However, li...
Salvatore Alessandro Sarcià, Victor R. Basi...
UIST
2009
ACM
15 years 4 months ago
Detecting and leveraging finger orientation for interaction with direct-touch surfaces
Current interactions on direct-touch interactive surfaces are often modeled based on properties of the input channel that are common in traditional graphical user interfaces (GUI)...
Feng Wang, Xiang Cao, Xiangshi Ren, Pourang Irani
ICPR
2008
IEEE
15 years 4 months ago
Application of the wrapper framework for image object detection
Tools for automatic image understanding for managing operator workloads are essential. One common task for image analysts is the scanning large collections of real-time images loo...
Michael Farmer