Sciweavers

2015 search results - page 150 / 403
» Hidden Software Capabilities
Sort
View
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 7 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
VLSISP
2010
191views more  VLSISP 2010»
13 years 4 months ago
Sign Language Phoneme Transcription with Rule-based Hand Trajectory Segmentation
A common approach to extract phonemes of sign language is to use an unsupervised clustering algorithm to group the sign segments. However, simple clustering algorithms based on dis...
W. W. Kong, Surendra Ranganath
COMPSAC
2006
IEEE
14 years 3 months ago
On the Distribution of Property Violations in Formal Models: An Initial Study
Model-checking techniques are successfully used in the verification of both hardware and software systems of industrial relevance. Unfortunately, the capability of current techni...
Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim...
IPPS
2005
IEEE
14 years 3 months ago
Dynamic Scalable Visualization for Collaborative Scientific Applications
Science disciplines are experiencing a data avalanche. As a result, scientific research is limited by data analysis and visualization capabilities. We have been working closely wi...
Kai Li, Matthew A. Hibbs, Grant Wallace, Olga G. T...
EUROMICRO
2003
IEEE
14 years 3 months ago
Merging components and testing tools: The Self-Testing COTS Components (STECC) Strategy
Development of a software system from existing components can surely have various benefits, but can also entail a series of problems. One type of problems is caused by a limited ...
Sami Beydeda, Volker Gruhn