Sciweavers

3441 search results - page 457 / 689
» Provenance of Software Development Processes
Sort
View
CISSE
2008
Springer
15 years 5 months ago
A New Methodology for Self Localization in Wireless Sensor Networks
Localization is the subject matter that has allured the attention of many researchers in the field of wireless sensor network. It is the process of assigning or computing the locat...
Allon Rai, Sangita Ale, Syed Sajjad Rizvi, Aasia R...
160
Voted
APPINF
2003
15 years 5 months ago
An XML Viewer for Tabular Forms for Use with Mechanical Documentation
We deal with mechanical documentation in software development tools. First, we review tabular forms for program specification and their formal syntax by an attribute edNCE graph ...
Omasu Inoue, Kensei Tsuchida, Shin-ichi Nakagawa, ...
108
Voted
WSC
1997
15 years 5 months ago
Simulation Optimization: Methods and Applications
Simulation optimization can be defined as the process of finding the best input variable values from among all possibilities without explicitly evaluating each possibility. The ob...
Yolanda Carson, Anu Maria
107
Voted
ESORICS
2010
Springer
15 years 4 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
328
Voted
ICSE
2012
IEEE-ACM
13 years 6 months ago
Axis: Automatically fixing atomicity violations through solving control constraints
Abstract—Atomicity, a general correctness criterion in concurrency programs, is often violated in real-world applications. The violations are difficult for developers to fix, m...
Peng Liu, Charles Zhang