Sciweavers

3555 search results - page 195 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
123
Voted
CSCWD
2005
Springer
15 years 9 months ago
A Web Service for Exchanging Procedural CAD Models Between Heterogeneous CAD Systems
It is a challenging issue to exchange procedural CAD models between heterogeneous CAD systems. In this paper, we extend the synchronized collaborative design environment among hete...
Xiang Chen, Min Li, Shuming Gao
AMOST
2005
ACM
15 years 6 months ago
Early estimation of defect density using an in-process Haskell metrics model
Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software d...
Mark Sherriff, Nachiappan Nagappan, Laurie A. Will...
160
Voted
IJCV
2007
113views more  IJCV 2007»
15 years 4 months ago
Vision and Rain
The visual effects of rain are complex. Rain produces sharp intensity changes in images and videos that can severely impair the performance of outdoor vision systems. In this paper...
Kshitiz Garg, Shree K. Nayar
ICST
2008
IEEE
15 years 10 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
IH
2005
Springer
15 years 9 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis