Sciweavers

8874 search results - page 1645 / 1775
» A New Implementation of Automath
Sort
View
ITCC
2005
IEEE
15 years 10 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
KBSE
2005
IEEE
15 years 10 months ago
Locating faulty code using failure-inducing chops
Software debugging is the process of locating and correcting faulty code. Prior techniques to locate faulty code either use program analysis techniques such as backward dynamic pr...
Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gup...
KBSE
2005
IEEE
15 years 10 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
VISUALIZATION
2005
IEEE
15 years 10 months ago
VisTrails: Enabling Interactive Multiple-View Visualizations
VisTrails is a new system that enables interactive multiple-view visualizations by simplifying the creation and maintenance of visualization pipelines, and by optimizing their exe...
Louis Bavoil, Steven P. Callahan, Carlos Eduardo S...
VISUALIZATION
2005
IEEE
15 years 10 months ago
Exploring 2D Tensor Fields Using Stress Nets
In this article we describe stress nets, a technique for exploring 2D tensor fields. Our method allows a user to examine simultaneously the tensors' eigenvectors (both major ...
Andrew Wilson, Rebecca M. Brannon
« Prev « First page 1645 / 1775 Last » Next »