Sciweavers

373 search results - page 47 / 75
» Synthesis of Trigger Properties
Sort
View
DSN
2000
IEEE
14 years 2 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
AGENTS
2000
Springer
14 years 2 months ago
Hormone-based control for self-reconfigurable robots
Self-reconfigurable or metamorphic robots can change their individual and collective shape and size to meet operational demands. Since these robots are constructed from a set of a...
Wei-Min Shen, Yimin Lu, Peter M. Will
SIGIR
1999
ACM
14 years 2 months ago
Content-Based Retrieval Using Heuristic Search
The fast growth of multimedia information in image and video databases has triggered research on efficient retrieval methods. This paper deals with structural queries, a type of c...
Dimitris Papadias, Marios Mantzourogiannis, Panos ...
CHI
2010
ACM
14 years 1 months ago
FM radio: family interplay with sonic mementos
Digital mementos are increasingly problematic, as people acquire large amounts of digital belongings that are hard to access and often forgotten. Based on fieldwork with 10 famili...
Daniela Petrelli, Nicolas Villar, Vaiva Kalnikait&...
JCP
2008
120views more  JCP 2008»
13 years 10 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong