Sciweavers

903 search results - page 101 / 181
» Usability inspection methods
Sort
View
WETICE
2007
IEEE
15 years 4 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
IFL
2007
Springer
120views Formal Methods» more  IFL 2007»
15 years 4 months ago
Lazy Contract Checking for Immutable Data Structures
Existing contract checkers for data structures force programmers to choose between poor alternatives. Contracts are either built into the functions that construct the data structur...
Robert Bruce Findler, Shu-yu Guo, Anne Rogers
UM
2007
Springer
15 years 4 months ago
Visual Attention in Open Learner Model Presentations: An Eye-Tracking Investigation
Using an eye-tracker, this paper investigates the information that learners visually attend to in their open learner model, and the degree to which this is related to the method of...
Susan Bull, Neil Cooke, Andrew Mabbott
TAICPART
2006
IEEE
131views Education» more  TAICPART 2006»
15 years 4 months ago
Bogor: A Flexible Framework for Creating Software Model Checkers
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. With the proliferation of multicore arch...
Robby, Matthew B. Dwyer, John Hatcliff
VTC
2006
IEEE
129views Communications» more  VTC 2006»
15 years 4 months ago
A Framework for Automatic Clustering of Parametric MIMO Channel Data Including Path Powers
— We present a solution to the problem of identifying clusters from MIMO measurement data in a data window, with a minimum of user interaction. Conventionally, visual inspection ...
Nicolai Czink, Pierluigi Cera, Jari Salo, Ernst Bo...