Sciweavers

3639 search results - page 194 / 728
» Experiments on IPv6 Testing
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
136
Voted
ICST
2010
IEEE
15 years 1 months ago
(Un-)Covering Equivalent Mutants
—Mutation testing measures the adequacy of a test suite by seeding artificial defects (mutations) into a program. If a test suite fails to detect a mutation, it may also fail to...
David Schuler, Andreas Zeller
ANLP
1997
137views more  ANLP 1997»
15 years 4 months ago
Probabilistic and Rule-Based Tagger of an Inflective Language- a Comparison
We present results of probabilistic tagging of Czech texts in order to show how these techniques work for one of the highly morphologically ambiguous inflective languages. After d...
Jan Hajic, Barbora Hladká
HAPTICS
2007
IEEE
15 years 9 months ago
Effects of Longitudinal Skin Stretch on the Perception of Friction
This work focuses on the relative importance of skin stretch imposed on the fingerpad on the perception of friction. Perceptual data is presented from two separate tests. The fi...
Nicholas D. Sylvester, William R. Provancher
MUM
2004
ACM
99views Multimedia» more  MUM 2004»
15 years 8 months ago
The Road Rager: making use of traffic encounters in a mobile multiplayer game
We present Road Rager, a prototype built in order to explore our hypothesis that proximity and a possibility to identify other players during temporary encounters could spur socia...
Liselott Brunnberg