Sciweavers

14 search results - page 2 / 3
» Blame for all
Sort
View
BROADNETS
2007
IEEE
13 years 11 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
ECOOP
2008
Springer
13 years 6 months ago
Safe Cross-Language Inheritance
Inheritance is a standard means for reuse and for interfacing with external libraries. In a multi-language software product, extending a class written in a statically-typed languag...
Kathryn E. Gray
ESEM
2009
ACM
13 years 9 months ago
A detailed examination of the correlation between imports and failure-proneness of software components
Research has provided evidence that type usage in source files is correlated with the risk of failure of software components. Previous studies that investigated the correlation b...
Ekwa Duala-Ekoko, Martin P. Robillard
IJCAI
2001
13 years 6 months ago
Narrative Prose Generation
Story generation is experiencing a revival, despite disappointing preliminary results from the preceding three decades. One of the principle reasons for previous inadequacies was ...
Charles B. Callaway, James C. Lester
TSD
2010
Springer
13 years 2 months ago
Diagnostics for Debugging Speech Recognition Systems
Modern speech recognition applications are becoming very complex program packages. To understand the error behaviour of the ASR systems, a special diagnosis - a procedure or a tool...
Milos Cernak