Sciweavers

3925 search results - page 410 / 785
» Measuring software evolution
Sort
View
COMSWARE
2008
IEEE
15 years 11 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri
203
Voted
IFL
2007
Springer
221views Formal Methods» more  IFL 2007»
15 years 10 months ago
From Contracts Towards Dependent Types: Proofs by Partial Evaluation
Abstract. The specification and resolution of non-trivial domain constraints has become a well-recognised measure for improving the stability of large software systems. In this pa...
Stephan Herhut, Sven-Bodo Scholz, Robert Bernecky,...
ATAL
2005
Springer
15 years 10 months ago
Magenta Logistics i-Scheduler
The following demonstration will provide an overview of the key functionality and capabilities of Magenta’s Logistics i-Scheduler – a multi-agent software tool for real time s...
Jonathan Himoff
140
Voted
AC
2003
Springer
15 years 9 months ago
A Face Recognition System Based on Local Feature Characterization
A completely automatic face recognition system is presented. The method works on color and gray level images: after having localized the face and the facial features, it determines...
Paola Campadelli, Raffaella Lanzarotti
APAQS
2000
IEEE
15 years 9 months ago
Quality Improvement - The Six Sigma Way
Six Sigma provides an effective mechanism to focus on customer requirements, through improvement of process quality. In the Global Engineering Development Center of Tata Consultan...
Mala Murugappan, Gargi Keeni