Sciweavers

39 search results - page 2 / 8
» Identifying Fault-Prone Software Modules Using Feed-Forward ...
Sort
View
CSB
2005
IEEE
202views Bioinformatics» more  CSB 2005»
13 years 11 months ago
Head and Neck Cancer Metastasis Prediction via Artificial Neural Networks
Cancers in head and neck tends to spread to nearby lymph nodes. Lymph nodes trap the spreading tumor cells but then the tumor starts to grow in these nodes and then spread further...
Eveleen Darby, Tezeswari Nettimi, Shilpa Kodali, L...
USS
2010
13 years 3 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
DATE
2009
IEEE
128views Hardware» more  DATE 2009»
14 years 23 hour ago
A case study in distributed deployment of embedded software for camera networks
—We present an embedded software application for the real-time estimation of building occupancy using a network of video cameras. We analyze a series of alternative decomposition...
Francesco Leonardi, Alessandro Pinto, Luca P. Carl...
DGO
2011
277views Education» more  DGO 2011»
12 years 5 months ago
Application of the MINOE regulatory analysis framework: case studies
In this paper, we describe a tool to help holistically understand, research and analyze the relationship between an ecosystem model and the relevant laws. Specifically, a software...
Julia A. Ekstrom, Gloria T. Lau, Kincho H. Law, Ma...
INFSOF
2006
90views more  INFSOF 2006»
13 years 5 months ago
Identifying knowledge brokers that yield software engineering knowledge in OSS projects
Much research on open source software development concentrates on developer lists and other software repositories to investigate what motivates professional software developers to...
Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angel...