Sciweavers

114 search results - page 19 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
CAISE
2006
Springer
13 years 11 months ago
Modeling User Behaviour Aware WebSites with PRML
Adaptive websites usually change as effect of user navigational actions. Most current web engineering approaches (which consider personalization) allow to detect basic user browsin...
Irene Garrigós, Jaime Gómez
CAI
2010
Springer
13 years 5 months ago
SMA - The Smyle Modeling Approach
Abstract. This paper introduces the model-based software development lifecycle model SMA--the Smyle Modeling Approach--which is centered around Smyle. Smyle is a dedicated learning...
Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern...
SIGSOFT
2002
ACM
14 years 8 months ago
Negative scenarios for implied scenario elicitation
Scenario-based specifications such as Message Sequence Charts (MSCs) are popular for requirement elicitation and specification. MSCs describe two distinct aspects of a system: on ...
Sebastián Uchitel, Jeff Kramer, Jeff Magee
AIPR
2006
IEEE
14 years 1 months ago
Recovering Spheres from 3D Point Data
The National Institute of Standards and Technology is involved in developing standard protocols for the performance evaluation of 3D imaging systems, which include laser scanners ...
Christoph Witzgall, Geraldine S. Cheok, Anthony J....
CHI
2009
ACM
14 years 8 months ago
Exploring video streams using slit-tear visualizations
Slit-tear visualizations allow users to selectively visualize pixel paths in a video scene. The slit-tear visualization technique is a generalization of the traditional photograph...
Anthony Tang, Saul Greenberg, Sidney Fels