Sciweavers

3792 search results - page 95 / 759
» Techniques for Trusted Software Engineering
Sort
View
QSIC
2009
IEEE
15 years 10 months ago
Tag-Based Techniques for Black-Box Test Case Prioritization for Service Testing
—A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors may still be compatible to its orig...
Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel
107
Voted
UIST
1997
ACM
15 years 7 months ago
Pick-and-Drop: A Direct Manipulation Technique for Multiple Computer Environments
This paper proposes a new field of user interfaces called multi-computer direct manipulation and presents a pen-based direct manipulation technique that can be used for data trans...
Jun Rekimoto
125
Voted
AVI
2010
15 years 5 months ago
A new weaving technique for handling overlapping regions
The use of transparencies is a common strategy in visual representations to guarantee the visibility of different overlapping graphical objects, especially, if no visibility-decid...
Martin Luboschik, Axel Radloff, Heidrun Schumann
149
Voted
TASLP
2011
14 years 10 months ago
Advances in Missing Feature Techniques for Robust Large-Vocabulary Continuous Speech Recognition
— Missing feature theory (MFT) has demonstrated great potential for improving the noise robustness in speech recognition. MFT was mostly applied in the log-spectral domain since ...
Maarten Van Segbroeck, Hugo Van Hamme
152
Voted
KBSE
2007
IEEE
15 years 9 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu