Sciweavers

4270 search results - page 796 / 854
» A Permutation Approach to Validation
Sort
View
121
Voted
ISESE
2006
IEEE
15 years 9 months ago
PBR vs. checklist: a replication in the n-fold inspection context
Inspection is considered a powerful method to check software documents for defects. Many published work shows that inspections in requirements specification phase are particularly...
Lulu He, Jeffrey C. Carver
155
Voted
ISMAR
2006
IEEE
15 years 9 months ago
Online camera pose estimation in partially known and dynamic scenes
One of the key requirements of augmented reality systems is a robust real-time camera pose estimation. In this paper we present a robust approach, which does neither depend on of...
Gabriele Bleser, Harald Wuest, Didier Stricker
113
Voted
LCN
2006
IEEE
15 years 9 months ago
Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks
A collision resolution scheme is essential to the performance of a random-access wireless network. Most schemes employ exponential backoff (EB) to adjust the transmission attempt ...
Peng Xuan Zheng, Ying Jun Zhang, Soung Chang Liew
135
Voted
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 9 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
152
Voted
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 9 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...