Sciweavers

368 search results - page 67 / 74
» Effectively utilizing project, product and process knowledge
Sort
View
APVIS
2010
13 years 9 months ago
CycleStack: Inferring periodic behavior via temporal sequence visualization in ultrasound video
A range of well-known treatment methods for destroying tumor and similar harmful growth in human body utilizes the coherence between the inherently periodic movement of the affect...
Teng-Yok Lee, Abon Chaudhuri, Fatih Porikli, Han-W...
ESEC
1997
Springer
13 years 11 months ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine
ISCI
2002
112views more  ISCI 2002»
13 years 7 months ago
Intelligent learning and control of autonomous robotic agents operating in unstructured environments
The control of autonomous intelligent robotic agent operating in unstructured changing environments includes many objective difficulties. One major difficulty concerns the charact...
Hani Hagras, Tarek M. Sobh
KBSE
2002
IEEE
14 years 12 days ago
Report on the Workshop on the State of the Art in Automated Software Engineering
ort gives their abstracts. s of the position papers Recent Experiences with Code Generation and Task Automation Agents in Software Tools (J. Grundy, J. Hosking) As software grows i...
Yves Ledru, David F. Redmiles
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...