Sciweavers

747 search results - page 110 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
SIMUTOOLS
2008
13 years 10 months ago
Real-time emulation of networked robot systems
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo ...
CSMR
2009
IEEE
14 years 3 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
IUI
1997
ACM
14 years 27 days ago
Decision Making in Intelligent User Interfaces
Intelligent user interfaces are characterised by their capability to adapt at run-time and make several communication decisions concerning ‘what’, ‘when’, ‘why’ and â€...
Constantine Stephanidis, Charalampos Karagiannidis...
W4A
2009
ACM
14 years 3 months ago
Virtual teaching in a society of learning
: This article relates a reflexion on the experience of authors as teachers in the E-learning modality of university-level teaching. Presently we live in the peak of the new techno...
António Eduardo Martins, Felipa lopes dos R...