Sciweavers

1414 search results - page 231 / 283
» Automated Metamorphic Testing
Sort
View
KBSE
2006
IEEE
14 years 1 months ago
Accurate Centralization for Applying Model Checking on Networked Applications
Software model checkers can be applied directly to single-process programs, which typically are multithreaded. Multi-process applications cannot be model checked directly. While m...
Cyrille Artho, Pierre-Loïc Garoche
3DGIS
2006
Springer
14 years 1 months ago
Texture Generation and Mapping Using Video Sequences for 3D Building Models
Abstract Three-dimensional (3D) building model is one of the most important components in a cyber city implementation and application. This study developed an effective and highly ...
Fuan Tsai, Cheng-Hsuan Chen, Jin-Kim Liu, Kuo-Hsin...
NORDICHI
2006
ACM
14 years 1 months ago
How ordinary internet users can have a chance to influence privacy policies
By ‘Obligation Management’ we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organi...
John Sören Pettersson, Simone Fischer-Hü...
NSPW
2006
ACM
14 years 1 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
SAC
2006
ACM
14 years 1 months ago
Relevance feedback methods for logo and trademark image retrieval on the web
Relevance feedback is the state-of-the-art approach for adjusting query results to the needs of the users. This work extends the existing framework of image retrieval with relevan...
Euripides G. M. Petrakis, Klaydios Kontis, Epimeni...