Sciweavers

5210 search results - page 902 / 1042
» Tools for Distributed Facilitation
Sort
View
ISSRE
2002
IEEE
15 years 2 months ago
Mutation of Java Objects
Fault insertion based techniqueshave been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating m...
Roger T. Alexander, James M. Bieman, Sudipto Ghosh...
NDSS
2002
IEEE
15 years 2 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
SIGMETRICS
2010
ACM
223views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Self-synchronizing properties of CSMA wireless multi-hop networks
We show that CSMA is able to spontaneously synchronize transmissions in a wireless network with constant-size packets, and that this property can be used to devise efficient synch...
Kuang Xu, Olivier Dousse, Patrick Thiran
APN
2010
Springer
15 years 2 months ago
Factorization Properties of Symbolic Unfoldings of Colored Petri Nets
The unfolding technique is an efficient tool to explore the runs of a Petri net in a true concurrency semantics, i.e. without constructing all the interleavings of concurrent actio...
Thomas Chatain, Eric Fabre
DAS
2010
Springer
15 years 2 months ago
IAMonDo-database: an online handwritten document database with non-uniform contents
In this paper we present a new database of online handwritten documents with different contents such as text, drawings, diagrams, formulas, tables, lists, and markings. It was de...
Emanuel Indermühle, Marcus Liwicki, Horst Bun...