Sciweavers

6884 search results - page 1348 / 1377
» The macro-structure of use of help
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
WETICE
2008
IEEE
14 years 2 months ago
Coordination of Knowledge in Pervasive Environments
The “amount” of knowledge is constantly growing. Technological advances more and more facilitate an access to knowledge in an anytime, anywhere, and anyhow manner. The provisi...
Manfred Bortenschlager, Lyndon J. B. Nixon, Robert...
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
14 years 2 months ago
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 2 months ago
Impact of Sampling Jitter on Mostly-Digital Architectures for UWB Bio-Medical Applications
Abstract— Ultra-wideband (UWB) impulse radio is a promising technique for low-power bio-medical communication systems. While a range of analog and digital UWB architectures exist...
Andrew Fort, Mike Chen, Robert W. Brodersen, Claud...
ICCCN
2007
IEEE
14 years 2 months ago
An FEC-based Reliable Data Transport Protocol for Underwater Sensor Networks
—In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor ...
Peng Xie, Jun-Hong Cui
« Prev « First page 1348 / 1377 Last » Next »