Sciweavers

586 search results - page 92 / 118
» Model-Driven User Requirements Specification using SysML
Sort
View
ISSRE
2005
IEEE
15 years 8 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
CIKM
2005
Springer
15 years 8 months ago
Novelty detection based on sentence level patterns
The detection of new information in a document stream is an important component of many potential applications. In this paper, a new novelty detection approach based on the identi...
Xiaoyan Li, W. Bruce Croft
ICCSA
2005
Springer
15 years 8 months ago
IMNET: An Experimental Testbed for Extensible Multi-user Virtual Environment Systems
Abstract. Multi-user virtual environment (MUVE) systems enable virtual participation in many applications. A MUVE usually is a complex system requiring technologies from 3D graphic...
Tsai-Yen Li, Mao-Yung Liao, Pai-Cheng Tao
112
Voted
WOSS
2004
ACM
15 years 8 months ago
Task-based self-adaptation
Recently there has been increasing interest in developing systems that can adapt dynamically to cope with changing environmental conditions and unexpected system errors. Most effo...
David Garlan, Vahe Poladian, Bradley R. Schmerl, J...
ISPA
2004
Springer
15 years 7 months ago
Context-Awareness in Mobile Web Services
Context-aware computing is a computing paradigm in which applications can take advantage of contextual information. Quality of network connection is a very important factor for mob...
Bo Han, Weijia Jia, Ji Shen, Man-Ching Yuen