


default search action
SwSTE 2016: Beer Sheva, Israel
- 2016 IEEE International Conference on Software Science, Technology and Engineering, SWSTE 2016, Beer Sheva, Israel, June 23-24, 2016. IEEE 2016, ISBN 978-1-5090-1018-9

Session 1: Machine Learning and Beyond
- Peng Peng

, Paulo S. C. Alencar, Donald D. Cowan:
A Software Framework for PCa-Based Face Recognition. 7-16 - Ziv Goldfeld, Paul Cuff, Haim H. Permuter

:
Semantic-Security Capacity for the Physical Layer via Information Theory. 17-27 - Ariel Bar, Bracha Shapira

, Lior Rokach, Moshe Unger:
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis. 28-36
Session 2: Software Design and Implementation
- Daniel M. Berry, Krzysztof Czarnecki, Michal Antkiewicz, Mohamed AbdelRazik:

The Problem of the Lack of Benefit of a Document to Its Producer (PotLoBoaDtiP). 37-42 - Reuven Gallant:

Thinking Fast: Patterns of Cognitive Error in Software Engineering Education and Practice. 43-50 - Sivan Toledo, Oren Kishon, Yotam Orchan, Adi Shohat, Ran Nathan

:
Lessons and Experiences from the Design, Implementation, and Deployment of a Wildlife Tracking System. 51-60 - Mira Balaban, Igal Khitron, Michael Kifer:

Multilevel Modeling and Reasoning with FOML. 61-70
Session 3: New Horizons and Education
- Rea Lavi

, Dov Dori, Yehudit Judy Dori:
Implementing an International Standard for Manufacturing System Lifecycle Management Using Object-Process Methodology. 71-76 - Yaron Gonen, Ehud Gudes:

An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets. 77-83 - Asher Wilk:

Cyber Security Education and Law. 94-103 - Oded Margalit:

Using Computer Programming Competition for Cyber Education. 104-107 - Ivens Portugal, Paulo S. C. Alencar, Donald D. Cowan:

A Preliminary Survey on Domain-Specific Languages for Machine Learning in Big Data. 108-110
Session 4: Networks and Beyond
- Liron Schiff, Stefan Schmid

:
Study the Past If You Would Define the Future: Implementing Secure Multi-party SDN Updates. 111-116 - Andreas Borgwart, Haya Schulmann, Michael Waidner

:
Towards Automated Measurements of Internet's Naming Infrastructure. 117-124 - Amir Menczel, Gera Weiss, Dror Fried:

On Modeling, Complexities, and Automatic Configuration of Wireless Industrial Control Networks. 125-134 - Sergey Rubinshtein, Rami Puzis

:
Modeling and Reconstruction of Multi-stage Attacks. 135-137 - Mohamed Amoud, Ounsa Roudiès

:
MaPE-K-Based Approach for Security @ Runtime. 138-140

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














