Sciweavers

6846 search results - page 175 / 1370
» Developing an Active Observer
Sort
View
117
Voted
CCS
2009
ACM
15 years 10 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
122
Voted
ISSRE
2008
IEEE
15 years 9 months ago
Cost Curve Evaluation of Fault Prediction Models
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Yue Jiang, Bojan Cukic, Tim Menzies
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 9 months ago
An Experiment on the Effects of Interruptions on Individual Work Trajectories and Performance in Critical Environments
Interruptions are a central characteristic of work in critical environments such as hospitals, airlines, and security agencies. Often, interruptions occur as notifications of some...
Suzanne P. Weisband, Kelly J. Fadel, Elisa Mattare...
MINENET
2006
ACM
15 years 9 months ago
Diagnosis of TCP overlay connection failures using bayesian networks
When failures occur in Internet overlay connections today, it is difficult for users to determine the root cause of failure. An overlay connection may require TCP connections bet...
George J. Lee, Lindsey Poole
ICITA
2005
IEEE
15 years 9 months ago
DREAM: A Practical Product Line Engineering Using Model Driven Architecture
Both product line engineering (PLE) and model driven architecture (MDA) are emerging as effective paradigms for building a family of applications in cost effective way. PLE suppor...
Soo Dong Kim, Hyun Gi Min, Jin Sun Her, Soo Ho Cha...