Sciweavers

2015 search results - page 210 / 403
» Hidden Software Capabilities
Sort
View
PERVASIVE
2005
Springer
15 years 10 months ago
Context Modeling for Device- and Location-Aware Mobile Web Applications
Ubiquitous Web systems have to deal with varying context information in order to support context awareness. Accomplishing this requirement necessitates gathering, processing and r...
Michael Hinz, Zoltán Fiala
144
Voted
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 10 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
ISESE
2003
IEEE
15 years 10 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
146
Voted
WCRE
2003
IEEE
15 years 10 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
GRAPHITE
2003
ACM
15 years 10 months ago
A 3D robot simulation for education
This paper describes the work-in-progress of creating an artificial 3D environment and robot, suitable for educational simulation. A visual 3D vehicle robot, equipped with a monoc...
Tim L. Dunn, Aster Wardhani