default search action
SwSTE 2016: Beer Sheva, Israel
- 2016 IEEE International Conference on Software Science, Technology and Engineering, SWSTE 2016, Beer Sheva, Israel, June 23-24, 2016. IEEE 2016, ISBN 978-1-5090-1018-9
Session 1: Machine Learning and Beyond
- Peng Peng, Paulo S. C. Alencar, Donald D. Cowan:
A Software Framework for PCa-Based Face Recognition. 7-16 - Ziv Goldfeld, Paul Cuff, Haim H. Permuter:
Semantic-Security Capacity for the Physical Layer via Information Theory. 17-27 - Ariel Bar, Bracha Shapira, Lior Rokach, Moshe Unger:
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis. 28-36
Session 2: Software Design and Implementation
- Daniel M. Berry, Krzysztof Czarnecki, Michal Antkiewicz, Mohamed AbdelRazik:
The Problem of the Lack of Benefit of a Document to Its Producer (PotLoBoaDtiP). 37-42 - Reuven Gallant:
Thinking Fast: Patterns of Cognitive Error in Software Engineering Education and Practice. 43-50 - Sivan Toledo, Oren Kishon, Yotam Orchan, Adi Shohat, Ran Nathan:
Lessons and Experiences from the Design, Implementation, and Deployment of a Wildlife Tracking System. 51-60 - Mira Balaban, Igal Khitron, Michael Kifer:
Multilevel Modeling and Reasoning with FOML. 61-70
Session 3: New Horizons and Education
- Rea Lavi, Dov Dori, Yehudit Judy Dori:
Implementing an International Standard for Manufacturing System Lifecycle Management Using Object-Process Methodology. 71-76 - Yaron Gonen, Ehud Gudes:
An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets. 77-83 - Asher Wilk:
Cyber Security Education and Law. 94-103 - Oded Margalit:
Using Computer Programming Competition for Cyber Education. 104-107 - Ivens Portugal, Paulo S. C. Alencar, Donald D. Cowan:
A Preliminary Survey on Domain-Specific Languages for Machine Learning in Big Data. 108-110
Session 4: Networks and Beyond
- Liron Schiff, Stefan Schmid:
Study the Past If You Would Define the Future: Implementing Secure Multi-party SDN Updates. 111-116 - Andreas Borgwart, Haya Schulmann, Michael Waidner:
Towards Automated Measurements of Internet's Naming Infrastructure. 117-124 - Amir Menczel, Gera Weiss, Dror Fried:
On Modeling, Complexities, and Automatic Configuration of Wireless Industrial Control Networks. 125-134 - Sergey Rubinshtein, Rami Puzis:
Modeling and Reconstruction of Multi-stage Attacks. 135-137 - Mohamed Amoud, Ounsa Roudiès:
MaPE-K-Based Approach for Security @ Runtime. 138-140
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.