Sciweavers

988 search results - page 142 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ISSTA
2006
ACM
14 years 2 months ago
Integrating customized test requirements with traditional requirements in web application testing
Existing test suite reduction techniques employed for testing web applications have either used traditional program coverage-based requirements or usage-based requirements. In thi...
Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lor...
OZCHI
2006
ACM
14 years 2 months ago
Applying reach in direct manipulation user interfaces
The HCI community currently faces the problem of making tangible user interfaces actively responsive to their user’s current physical context. This paper explores the context of...
Aaron Toney, Bruce H. Thomas
ICCV
2005
IEEE
14 years 2 months ago
Inference of Non-Overlapping Camera Network Topology by Measuring Statistical Dependence
We present an approach for inferring the topology of a camera network by measuring statistical dependence between observations in different cameras. Two cameras are considered con...
Kinh Tieu, Gerald Dalley, W. Eric L. Grimson
ICTAI
2005
IEEE
14 years 2 months ago
Cellular Ants: Combining Ant-Based Clustering with Cellular Automata
This paper proposes a novel data clustering algorithm, coined ‘cellular ants’, which combines principles of cellular automata and ant colony optimization algorithms to group s...
Andrew Vande Moere, Justin James Clayden
IWIA
2005
IEEE
14 years 2 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan