Sciweavers

2015 search results - page 280 / 403
» Hidden Software Capabilities
Sort
View
120
Voted
JSW
2008
98views more  JSW 2008»
15 years 21 days ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
140
Voted
IIE
2007
154views more  IIE 2007»
15 years 20 days ago
Computer Aided Modelling Exercises
This paper describes a didactical Computer Aided Software Engineering (CASE)-tool that was developed for use within the context of a course in object-oriented domain modelling. In...
Monique Snoeck, Raf Haesen, Herman Buelens, Manu D...
101
Voted
RAS
2006
100views more  RAS 2006»
15 years 20 days ago
Aibo and Webots: Simulation, wireless remote control and controller transfer
This article introduces a new software tool that provides an accurate simulation of Sony Aibo robots and the capability to transfer controller programs from the simulation to the ...
Lukas Hohl, Ricardo A. Téllez, Olivier Mich...
KBS
2007
100views more  KBS 2007»
15 years 18 days ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
102
Voted
DSE
1998
80views more  DSE 1998»
15 years 12 days ago
The Voltan application programming environment for fail-silent processes
The Voltan software library for building distributed applications provides the support for (i) a processpair to act as single Voltan self-checking ‘fail-silent’ process; and (...
Dave Black, C. Low, Santosh K. Shrivastava