Sciweavers

1989 search results - page 328 / 398
» Modeling presentation layers of web applications for testing
Sort
View
124
Voted
COMPSAC
2006
IEEE
15 years 9 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
128
Voted
CSCW
2006
ACM
15 years 9 months ago
Sandboxes: supporting social play through collaborative multimedia composition on mobile phones
Media sharing over mobile devices is quickly becoming a common practice, used to support a variety of social processes. Most existing systems employ a model of sharing that treats...
David Fono, Scott Counts
134
Voted
ISVC
2005
Springer
15 years 9 months ago
A Hybrid HMM/DPA Adaptive Gesture Recognition Method
We present a hybrid classification method applicable to gesture recognition. The method combines elements of Hidden Markov Models (HMM) and various Dynamic Programming Alignment (...
Stjepan Rajko, Gang Qian
ICANN
2001
Springer
15 years 8 months ago
Generalized Relevance LVQ for Time Series
Abstract. An application of the recently proposed generalized relevance learning vector quantization (GRLVQ) to the analysis and modeling of time series data is presented. We use G...
Marc Strickert, Thorsten Bojer, Barbara Hammer
GECCO
1999
Springer
15 years 8 months ago
Infrastructure Work Order Planning Using Genetic Algorithms
Infrastructure management offices plan and complete several thousand small construction projects annually. Effective planning is vital if the public and private sectors are to mai...
E. William East