Sciweavers

1005 search results - page 165 / 201
» Patterns for Refinement Automation
Sort
View
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ICCBR
2009
Springer
14 years 3 months ago
Using Meta-reasoning to Improve the Performance of Case-Based Planning
Case-based planning (CBP) systems are based on the idea of reusing past successful plans for solving new problems. Previous research has shown the ability of meta-reasoning approac...
Manish Mehta, Santiago Ontañón, Ashw...
KBSE
2008
IEEE
14 years 3 months ago
Random Test Run Length and Effectiveness
Abstract—A poorly understood but important factor in random testing is the selection of a maximum length for test runs. Given a limited time for testing, it is seldom clear wheth...
James H. Andrews, Alex Groce, Melissa Weston, Ru-G...
VL
2008
IEEE
151views Visual Languages» more  VL 2008»
14 years 3 months ago
Codetrail: Connecting source code and web resources
When faced with the need for documentation, examples, bug fixes, error descriptions, code snippets, workarounds, templates, patterns, or advice, software developers frequently tu...
Max Goldman, Robert C. Miller
ACSAC
2007
IEEE
14 years 3 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves