Sciweavers

2015 search results - page 210 / 403
» Hidden Software Capabilities
Sort
View
125
Voted
PERVASIVE
2005
Springer
15 years 9 months ago
Context Modeling for Device- and Location-Aware Mobile Web Applications
Ubiquitous Web systems have to deal with varying context information in order to support context awareness. Accomplishing this requirement necessitates gathering, processing and r...
Michael Hinz, Zoltán Fiala
123
Voted
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 8 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
115
Voted
ISESE
2003
IEEE
15 years 8 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
WCRE
2003
IEEE
15 years 8 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
143
Voted
GRAPHITE
2003
ACM
15 years 8 months ago
A 3D robot simulation for education
This paper describes the work-in-progress of creating an artificial 3D environment and robot, suitable for educational simulation. A visual 3D vehicle robot, equipped with a monoc...
Tim L. Dunn, Aster Wardhani