Sciweavers

672 search results - page 25 / 135
» An assessment of tag presentation techniques
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
VRST
1997
ACM
13 years 12 months ago
A framework and testbed for studying manipulation techniques for immersive VR
Developing virtual reality (VR) applications which enable actual work over a period of time requires optimization of the most basic interactions, such as object manipulation, so t...
Ivan Poupyrev, Suzanne Weghorst, Mark Billinghurst...
CEC
2009
IEEE
14 years 2 months ago
Implicit Context Representation Cartesian Genetic Programming for the assessment of visuo-spatial ability
— In this paper, a revised form of Implicit Context Representation Cartesian Genetic Programming is used in the development of a diagnostic tool for the assessment of patients wi...
Stephen L. Smith, Michael A. Lones
SCAM
2007
IEEE
14 years 1 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten
ICSE
2003
IEEE-ACM
14 years 7 months ago
Scenario-based Assessment of Software Architecture Usability
Over the years the software engineering community has increasingly realized the important role software architecture plays in fulfilling the quality requirements of a system. The ...
Eelke Folmer, Jilles van Gurp, Jan Bosch