Sciweavers

254 search results - page 30 / 51
» Social networks in software process improvement
Sort
View
92
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
15 years 3 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
102
Voted
CIKM
2010
Springer
14 years 8 months ago
Fast and accurate estimation of shortest paths in large graphs
Computing shortest paths between two given nodes is a fundamental operation over graphs, but known to be nontrivial over large disk-resident instances of graph data. While a numbe...
Andrey Gubichev, Srikanta J. Bedathur, Stephan Seu...
SMC
2010
IEEE
193views Control Systems» more  SMC 2010»
14 years 7 months ago
A cooperative approach for handshake detection based on body sensor networks
The handshake gesture is an important part of the social etiquette in many cultures. It lies at the core of many human interactions, either in formal or informal settings: exchangi...
Antonio Augimeri, Giancarlo Fortino, Manoj R. Rege...
AINA
2010
IEEE
14 years 6 months ago
Neural Network Trainer through Computer Networks
- This paper introduces a neural network training tool through computer networks. The following algorithms, such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Lev...
Nam Pham, Hao Yu, Bogdan M. Wilamowski