Sciweavers

903 search results - page 141 / 181
» Usability inspection methods
Sort
View
IJCNN
2006
IEEE
15 years 4 months ago
Venn-like models of neo-cortex patches
— This work presents a new architecture of artificial neural networks – Venn Networks, which produce localized activations in a 2D map while executing simple cognitive tasks. T...
Fernando Buarque de Lima Neto, Philippe De Wilde
IMC
2006
ACM
15 years 4 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
MSR
2006
ACM
15 years 4 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
VISUALIZATION
2003
IEEE
15 years 3 months ago
Visualizing Industrial CT Volume Data for Nondestructive Testing Applications
This paper describes a set of techniques developed for the visualization of high-resolution volume data generated from industrial computed tomography for nondestructive testing (N...
Runzhen Huang, Kwan-Liu Ma, Patrick S. McCormick, ...
ECOOPW
1999
Springer
15 years 2 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad