Sciweavers

741 search results - page 57 / 149
» An Analysis of Rule Evaluation Metrics
Sort
View
COMSWARE
2006
IEEE
14 years 3 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
IJCV
2007
210views more  IJCV 2007»
13 years 8 months ago
A Behavioral Analysis of Computational Models of Visual Attention
Robots often incorporate computational models of visual attention to streamline processing. Even though the number of visual attention systems employed on robots has increased dram...
Frederick Shic, Brian Scassellati
ICSE
2003
IEEE-ACM
14 years 2 months ago
An Analysis of the Fault Correction Process in a Large-Scale SDL Production Model
Improvements in the software development process depend on our ability to collect and analyze data drawn from various phases of the development life cycle. Our design metrics rese...
Dolores M. Zage, Wayne M. Zage
MSWIM
2009
ACM
14 years 4 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
TMC
2008
129views more  TMC 2008»
13 years 9 months ago
Mobility Modeling and Performance Evaluation of Heterogeneous Wireless Networks
The future-generation wireless systems will combine heterogeneous wireless access technologies to provide mobile users with seamless access to a diverse set of applications and ser...
Ahmed H. Zahran, Ben Liang, Aladdin Saleh