Sciweavers

124 search results - page 17 / 25
» Software Safety: Where's the Evidence
Sort
View
PKDD
2005
Springer
96views Data Mining» more  PKDD 2005»
14 years 1 months ago
Testing Theories in Particle Physics Using Maximum Likelihood and Adaptive Bin Allocation
We describe a methodology to assist scientists in quantifying the degree of evidence in favor of a new proposed theory compared to a standard baseline theory. The figure of merit ...
Bruce Knuteson, Ricardo Vilalta
CAI
2006
Springer
13 years 7 months ago
Analysis and Design of Mobile Collaborative Applications Using Contextual Elements
Collaborative mobile applications support users on the move in order to perform a collaborative task. One of the challenges when designing such applications is to consider the cont...
Rosa Alarcón, Luis A. Guerrero, Sergio F. O...
IJDE
2007
384views more  IJDE 2007»
13 years 7 months ago
Computer Forensic Analysis in a Virtual Environment
In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and softwa...
Derek Bem, Ewa Huebner
ESORICS
2011
Springer
12 years 7 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
IUI
2004
ACM
14 years 28 days ago
Exploiting emotions to disambiguate dialogue acts
This paper describes an attempt to reveal the user’s intention from dialogue acts, thereby improving the effectiveness of natural interfaces to pedagogical agents. It focuses o...
Wauter Bosma, Elisabeth André