Sciweavers

1029 search results - page 72 / 206
» Dependence Anti Patterns
Sort
View
SECURWARE
2008
IEEE
14 years 3 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
PERSUASIVE
2007
Springer
14 years 3 months ago
The Behavior Chain for Online Participation: How Successful Web Services Structure Persuasion
The success of many online services today depends on the company’s ability to persuade users to take specific actions, such as registering or inviting friends. We examined over 5...
B. J. Fogg, Dean Eckles
IWPC
2006
IEEE
14 years 3 months ago
How Developers Copy
Copy-paste programming is dangerous as it may lead to hidden dependencies between different parts of the system. Modifying clones is not always straight forward, because we might ...
Mihai Balint, Radu Marinescu, Tudor Gîrba
VTC
2006
IEEE
132views Communications» more  VTC 2006»
14 years 3 months ago
Interference Diversity in Frequency-Hopped Systems with Soft Decoding
— In this paper, we analyze the effect of interference diversity on the capacity of a cellular system that employs frequency hopping, power control and bit-interleaved coded modu...
Kostas Stamatiou, John G. Proakis
VTS
2005
IEEE
96views Hardware» more  VTS 2005»
14 years 2 months ago
Implementing a Scheme for External Deterministic Self-Test
A new method for test resource partitioning is introduced which keeps the design-for-test logic independent of the test set and moves the test pattern dependent information to an ...
Abdul Wahid Hakmi, Hans-Joachim Wunderlich, Valent...