Sciweavers

1663 search results - page 237 / 333
» Computer Security in the Real World
Sort
View
CRITICAL
2005
15 years 6 months ago
Participatory design: the will to succeed
With its 10th biannual anniversary conference, Participatory Design (PD) is leaving its teens and must now be considered ready to join the adult world. In this article we encourag...
Dan Shapiro
EDCC
2008
Springer
15 years 5 months ago
Software Faults Diagnosis in Complex OTS Based Safety Critical Systems
This work addresses the problem of software fault diagnosis in complex safety critical software systems. The transient manifestations of software faults represent a challenging is...
Gabriella Carrozza, Domenico Cotroneo, Stefano Rus...
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
15 years 5 months ago
Radius Plots for Mining Tera-byte Scale Graphs: Algorithms, Patterns, and Observations
Given large, multi-million node graphs (e.g., FaceBook, web-crawls, etc.), how do they evolve over time? How are they connected? What are the central nodes and the outliers of the...
U. Kang, Charalampos E. Tsourakakis, Ana Paula App...
VMV
2008
122views Visualization» more  VMV 2008»
15 years 5 months ago
Statistical analysis of Multi-Material Components using Dual Energy CT
This work describes a novel method for statistical analysis of multi-material components. The application scenario is industrial 3D X-ray computed tomography, emphasizing metrolog...
Christoph Heinzl, Johann Kastner, Torsten Möl...
169
Voted
IWCMC
2010
ACM
15 years 4 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...