Sciweavers

5843 search results - page 1034 / 1169
» Software Security in Practice
Sort
View
IROS
2006
IEEE
111views Robotics» more  IROS 2006»
15 years 10 months ago
A Delay-tolerant, Potential field-based, Network Implementation of an Integrated Navigation System
Abstract—Network controllers (NCs) are devices that are capable of converting dynamic, spatially extended, and functionally specialized modules into a taskable goal-oriented grou...
Rachana Ashok Gupta, Ahmad A. Masoud, Mo-Yuen Chow
CSCW
2006
ACM
15 years 10 months ago
Identification of coordination requirements: implications for the Design of collaboration and awareness tools
Task dependencies drive the need to coordinate work activities. We describe a technique for using automatically generated archival data to compute coordination requirements, i.e.,...
Marcelo Cataldo, Patrick Wagstrom, James D. Herbsl...
ISSTA
2006
ACM
15 years 10 months ago
Producing scheduling that causes concurrent programs to fail
A noise maker is a tool that seeds a concurrent program with conditional synchronization primitives (such as yield()) for the purpose of increasing the likelihood that a bug manif...
Yosi Ben-Asher, Yaniv Eytani, Eitan Farchi, Shmuel...
ICALT
2005
IEEE
15 years 10 months ago
An Empirical Exploration of Using Wiki in an English as a Second Language Course
In this paper, we present an empirical study of using a new and cost-effective Web-based collaboration software, Wiki, in a freshman-level English as a second language (ESL) cours...
Hao-Chuan Wang, Chun-Hung Lu, Jun-Yi Yang, Hsin-We...
ISESE
2005
IEEE
15 years 10 months ago
Exploratory testing: a multiple case study
Exploratory testing (ET) – simultaneous learning, test design, and test execution – is an applied practice in industry but lacks research. We present the current knowledge of ...
Juha Itkonen, Kristian Rautiainen
« Prev « First page 1034 / 1169 Last » Next »