Sciweavers

443 search results - page 53 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Introducing Hardware-in-Loop Concept to the Hardware/Software Co-design of Real-time Embedded Systems
—As the need for embedded systems to interact with other systems is growing fast, we see great opportunities in introducing the hardware-in-the-loop technique to the field of ha...
Dogan Fennibay, Arda Yurdakul, Alper Sen
JCDL
2006
ACM
71views Education» more  JCDL 2006»
14 years 1 months ago
Using controlled query generation to evaluate blind relevance feedback algorithms
Currently in document retrieval there are many algorithms each with different strengths and weakness. There is some difficulty, however, in evaluating the impact of the test quer...
Chris Jordan, Carolyn R. Watters, Qigang Gao
27
Voted
HICSS
2005
IEEE
110views Biometrics» more  HICSS 2005»
14 years 1 months ago
A Trust-based Negotiation Mechanism for Decentralized Economic Scheduling
Abstract— This paper presents a decentralized negotiation protocol for cooperative economic scheduling in a supply chain environment. For this purpose we designed autonomous agen...
Tim Stockheim, Oliver Wendt, Michael Schwind
AAAI
2007
13 years 10 months ago
The VITA Financial Services Sales Support Environment
Knowledge-based recommender technologies support customers and sales representatives in the identification of appropriate products and services. These technologies are especially ...
Alexander Felfernig, Klaus Isak, Kalman Szabo, Pet...
CF
2009
ACM
13 years 5 months ago
High accuracy failure injection in parallel and distributed systems using virtualization
Emulation sits between simulation and experimentation to complete the set of tools available for software designers to evaluate their software and predict behavior under condition...
Thomas Hérault, Thomas Largillier, Sylvain ...