Sciweavers

419 search results - page 64 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
CHI
2009
ACM
14 years 8 months ago
Out from behind the curtain: learning from a human auditory display
In this paper we describe an approach to gathering design requirements for a software auditory display by analyzing user interactions with an ideal partner: a talking human contro...
Peter Parente, Gary Bishop
MOBIDE
2003
ACM
14 years 22 days ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
SOUPS
2010
ACM
13 years 11 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill
WCRE
2008
IEEE
14 years 1 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
ICST
2009
IEEE
13 years 5 months ago
Test Redundancy Measurement Based on Coverage Information: Evaluations and Lessons Learned
Measurement and detection of redundancy in test suites attempt to achieve test minimization which in turn can help reduce test maintenance costs, and to also ensure the integrity ...
Negar Koochakzadeh, Vahid Garousi, Frank Maurer