Sciweavers

20017 search results - page 195 / 4004
» Using personas effectively
Sort
View
CCS
2007
ACM
15 years 9 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
ICALT
2006
IEEE
15 years 9 months ago
Assessing the Effectiveness of Virtual Reality Technology as part of an Authentic Learning Environment
Application of Virtual Reality (VR) in training and education seems to give excellent promise in providing an alternative “real life” environment in situations where it is imp...
Ros A. Yahaya
ICDCSW
2006
IEEE
15 years 9 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
131
Voted
IJCNN
2006
IEEE
15 years 9 months ago
Effective Training Methods for Function Localization Neural Networks
— Inspired by Hebb’s cell assembly theory about how the brain worked, we have developed a function localization neural network (FLNN). The main part of a FLNN is structurally t...
Takafumi Sasakawa, Jinglu Hu, Katsunori Isono, Kot...
VEE
2006
ACM
131views Virtualization» more  VEE 2006»
15 years 9 months ago
HotpathVM: an effective JIT compiler for resource-constrained devices
We present a just-in-time compiler for a Java VM that is small enough to fit on resource-constrained devices, yet is surprisingly effective. Our system dynamically identifies tr...
Andreas Gal, Christian W. Probst, Michael Franz