Sciweavers

1186 search results - page 129 / 238
» Analysis of Virtual Workspaces
Sort
View
ECBS
2006
IEEE
166views Hardware» more  ECBS 2006»
14 years 3 months ago
Model Transformations in the Model-Based Development of Real-time Systems
In this paper we argue for UML-based metamodeling and pattern-based graph transformation techniques in computer-based systems development through an illustrative example from the ...
Tivadar Szemethy, Gabor Karsai, Daniel Balasubrama...
HICSS
2003
IEEE
167views Biometrics» more  HICSS 2003»
14 years 2 months ago
Discovering Group Interaction Patterns in a Teachers Professional Community
Managers and group leaders of a community may not have enough information to help them direct the community development. In this paper, we adopt social network analysis, graph the...
Fu-ren Lin, Chun-Hung Chen, Kuo-Lung Tsai
ICASSP
2011
IEEE
13 years 19 days ago
A methodology for evaluating the accuracy of wave field rendering techniques
In this paper we propose a methodology for assessing the accuracy of techniques of wave field rendering through loudspeaker arrays. In order to measure the rendered wave field w...
Antonio Canclini, Paolo Annibale, Fabio Antonacci,...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 3 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
PLDI
2009
ACM
14 years 3 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...