Sciweavers

103 search results - page 6 / 21
» Towards the next generation of bug tracking systems
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
ETRA
2006
ACM
143views Biometrics» more  ETRA 2006»
14 years 1 months ago
openEyes: a low-cost head-mounted eye-tracking solution
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Dongheng Li, Jason S. Babcock, Derrick Parkhurst
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 7 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
14 years 7 months ago
Model Based Test Generation for Microprocessor Architecture Validation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. Traditionally, the different components (or validation collaterals) used i...
Sreekumar V. Kodakara, Deepak Mathaikutty, Ajit Di...
ISTA
2008
13 years 8 months ago
Towards Truly Flexible and Adaptive Process-Aware Information Systems
If current process management systems shall be applied to a broad spectrum of applications, they will have to be significantly improved with respect to their technological capabili...
Peter Dadam, Manfred Reichert, Stefanie Rinderle, ...