Sciweavers

26 search results - page 4 / 6
» Visualisation for Validation
Sort
View
IJRFITA
2007
103views more  IJRFITA 2007»
13 years 7 months ago
Characterisation of RF propagation in rectangular metal pipes for passive RFID systems
: In this paper, we collect and extend the theory of Radio Frequency (RF) propagation within rectangular metal pipes. This work is motivated by the need to understand the operation...
Darmindra D. Arumugam, Daniel W. Engels
GECCO
2009
Springer
127views Optimization» more  GECCO 2009»
14 years 2 months ago
Geometrical insights into the dendritic cell algorithm
This work examines the dendritic cell algorithm (DCA) from a mathematical perspective. By representing the signal processing phase of the algorithm using the dot product it is sho...
Thomas Stibor, Robert Oates, Graham Kendall, Jonat...
ICSM
2007
IEEE
14 years 1 months ago
Design recovery and maintenance of build systems
The build system forms an indispensable part of any software project. It needs to evolve in parallel with the source code in order to build, test and install the software. Unfortu...
Bram Adams, Herman Tromp, Kris De Schutter, Wolfga...
IV
2005
IEEE
142views Visualization» more  IV 2005»
14 years 1 months ago
Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?
The field of information visualization offers little methodological guidance to practitioners who seek to design novel systems. Though many sources describe the foundations of the...
Brock Craft, Paul A. Cairns
HAIS
2010
Springer
14 years 8 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...