Sciweavers

11462 search results - page 354 / 2293
» Developing Application-Centric Methods
Sort
View
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
14 years 15 days ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
KDD
2012
ACM
187views Data Mining» more  KDD 2012»
13 years 7 months ago
Sampling minimal frequent boolean (DNF) patterns
We tackle the challenging problem of mining the simplest Boolean patterns from categorical datasets. Instead of complete enumeration, which is typically infeasible for this class ...
Geng Li, Mohammed J. Zaki
AAAI
2012
13 years 7 months ago
Colorization by Matrix Completion
Given a monochrome image and some manually labeled pixels, the colorization problem is a computer-assisted process of adding color to the monochrome image. This paper proposes a n...
Shusen Wang, Zhihua Zhang
FASE
2007
Springer
15 years 11 months ago
Testing Scenario-Based Models
The play-in/play-out approach suggests a new paradigm for system development using scenario-based requirements. It allows the user to develop a high level scenario-based model of t...
Hillel Kugler, Michael J. Stern, E. Jane Albert Hu...
NSPW
2004
ACM
15 years 10 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten