Sciweavers

3527 search results - page 359 / 706
» Test Automation in Practice
Sort
View
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 11 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
158
Voted
WCRE
2008
IEEE
15 years 11 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
EMSOFT
2007
Springer
15 years 10 months ago
Performance estimation of distributed real-time embedded systems by discrete event simulations
Key challenges in the performance estimation of distributed real-time embedded (DRE) systems include the systematic measurement of coverage by simulations, and the automated gener...
Gabor Madl, Nikil Dutt, Sherif Abdelwahed
HOLOMAS
2007
Springer
15 years 10 months ago
Information Agents Handling Semantic Data as an Extension to Process Monitoring Systems
An approach to extend process monitoring with the help of information agents (IA) handling semantic data is presented in this paper. According to this approach, an operator of a pr...
Teppo Pirttioja, Ilkka Seilonen, Antti Pakonen, Aa...
SEMWEB
2007
Springer
15 years 10 months ago
Matching Patient Records to Clinical Trials Using Ontologies
Abstract. This paper describes a large case study that explores the applicability of ontology reasoning to problems in the medical domain. We investigate whether it is possible to ...
Chintan Patel, James J. Cimino, Julian Dolby, Achi...