Sciweavers

806 search results - page 141 / 162
» A Practitioners
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 20 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
FTRTFT
1998
Springer
14 years 20 days ago
On the Need for Practical Formal Methods
A controversial issue in the formal methods community is the degree to which mathematical sophistication and theorem proving skills should be needed to apply a formal method. A fun...
Constance L. Heitmeyer
VISUALIZATION
1997
IEEE
14 years 19 days ago
Application-controlled demand paging for out-of-core visualization
In the area of scientific visualization, input data sets are often very large. In visualization of Computational Fluid Dynamics (CFD) in particular, input data sets today can surp...
Michael Cox, David Ellsworth
APCHI
2004
IEEE
14 years 5 days ago
Understanding Interaction Experience in Mobile Learning
The convergence of mobile technology and e-learning has generated considerable excitement among both practitioners and academics. Mass media continually promotes novel idea about m...
Fariza Hanis Abdul Razak
ECMDAFA
2006
Springer
166views Hardware» more  ECMDAFA 2006»
14 years 3 days ago
Dynamic Logic Semantics for UML Consistency
Abstract. The Unified Modelling Language (UML) is intended to describe systems, but it is not clear what systems satisfy a given collection of UML diagrams. Stephen Mellor has desc...
Greg O'Keefe