Sciweavers

2686 search results - page 506 / 538
» Using a neural network in the software testing process
Sort
View
SOUPS
2005
ACM
14 years 2 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
VRST
2009
ACM
14 years 3 months ago
Standalone edge-based markerless tracking of fully 3-dimensional objects for handheld augmented reality
This paper presents a markerless tracking technique targeted to the Windows Mobile Pocket PC platform. The primary aim of this work is to allow the development of standalone augme...
João Paulo S. M. Lima, Veronica Teichrieb, ...
KCAP
2003
ACM
14 years 2 months ago
Aiding knowledge capture by searching for extensions of knowledge models
Electronic concept mapping tools empower experts to play an active role in the knowledge capture process, and provide a medium for building richly connected multimedia knowledge m...
David B. Leake, Ana Gabriela Maguitman, Thomas Rei...
BMCBI
2007
168views more  BMCBI 2007»
13 years 9 months ago
GOSim - an R-package for computation of information theoretic GO similarities between terms and gene products
Background: With the increased availability of high throughput data, such as DNA microarray data, researchers are capable of producing large amounts of biological data. During the...
Holger Fröhlich, Nora Speer, Annemarie Poustk...
CCS
2005
ACM
14 years 2 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...