Sciweavers

5843 search results - page 1164 / 1169
» Software Security in Practice
Sort
View
CACM
1999
113views more  CACM 1999»
13 years 7 months ago
Object-oriented Abstractions for Distributed Programming
ion suffices ("decide which type you want and provide a full set of operations for each type"). If the application domain is, say, the administration of a university, the...
Rachid Guerraoui, Mohamed Fayad
INFORMS
1998
142views more  INFORMS 1998»
13 years 7 months ago
Distributed State Space Generation of Discrete-State Stochastic Models
High-level formalisms such as stochastic Petri nets can be used to model complex systems. Analysis of logical and numerical properties of these models often requires the generatio...
Gianfranco Ciardo, Joshua Gluckman, David M. Nicol
TCSV
2002
148views more  TCSV 2002»
13 years 7 months ago
A full-featured, error-resilient, scalable wavelet video codec based on the set partitioning in hierarchical trees (SPIHT) algor
Compressed video bitstreams require protection from channel errors in a wireless channel. The threedimensional (3-D) SPIHT coder has proved its efficiency and its real-time capabi...
Sungdae Cho, William A. Pearlman
TSE
2002
140views more  TSE 2002»
13 years 7 months ago
Test Case Prioritization: A Family of Empirical Studies
To reduce the cost of regression testing, software testers may prioritize their test cases so that those which are more important, by some measure, are run earlier in the regressi...
Sebastian G. Elbaum, Alexey G. Malishevsky, Gregg ...
PSYCHNOLOGY
2007
113views more  PSYCHNOLOGY 2007»
13 years 7 months ago
Psychological Implications of Domestic Assistive Technology for the Elderly
The ROBOCARE Domestic Environment (RDE) is the result of a three-year project aimed at developing cognitive support technology for elderly people. Specifically, the domestic envir...
Amedeo Cesta, Gabriella Cortellessa, Vittoria Giul...
« Prev « First page 1164 / 1169 Last » Next »