Sciweavers

324 search results - page 14 / 65
» What's in a Step
Sort
View
IH
2007
Springer
14 years 4 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
STEP
2003
IEEE
14 years 3 months ago
Improvement of Test Data by Measuring SQL Statement Coverage
Many software applications produced today have a component, of lesser or greater importance to the structure, that is based on database management systems. What is more, this infor...
María José Suárez Cabal, Javi...
IVA
2001
Springer
14 years 2 months ago
Autonomous Avatars? From Users to Agents and Back
We describe the architecture of an interactive, “believable” agent with personality, called user agent, which can act on behalf of a user in various multi-user game contexts, w...
Matthias Scheutz, Brigitte Römmer
ACMDIS
2000
ACM
14 years 2 months ago
Touch Me, Hit Me and I Know How You Feel: A Design Approach to Emotionally Rich Interaction
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
WICSA
2008
13 years 11 months ago
Developing Value Assessment for SW Architecture
During the last decades software architecture has become increasingly important for companies creating competitive product structures. Recently more and more attention has also be...
Pasi Ojala