Sciweavers

44 search results - page 9 / 9
» Dependency Analysis and Visualization as Tools to Prolong Sy...
Sort
View
ICST
2009
IEEE
13 years 12 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
WSC
2000
13 years 6 months ago
Developing a national allocation model for cadaveric kidneys
The UNOS Kidney Allocation Model (UKAM) is a software tool for the simulation and analysis of national cadaveric kidney and kidney-pancreas allocation policies for transplantation...
Sarah E. Taranto, Ann M. Harper, Erick B. Edwards,...
VIP
2001
13 years 6 months ago
Avatars: A Shifting Interaction
The intersection of theatre-performance, design, and informatics is a fertile area for a broader understanding of the possible design and interaction between people and avatars in...
Kristine Deray
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 3 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...