Sciweavers

SAC
2015
ACM
8 years 3 days ago
Automated generation of visual web tests from DOM-based web tests
: Functional test automation is increasingly adopted by web applications developers. In particular, 2nd generation tools overcome the limitations of 1st generation tools, based on ...
Maurizio Leotta, Andrea Stocco, Filippo Ricca, Pao...
SAC
2015
ACM
8 years 3 days ago
Robust resource allocation in security games and ensemble modeling of adversary behavior
Game theoretic algorithms have been used to optimize the allocation of security resources to improve the protection of critical infrastructure against threats when limits on secur...
Arjun Tambe, Thanh Nguyen
SAC
2015
ACM
8 years 3 days ago
All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction
In this paper we have applied the stacking technique on images from a medical device. There is an urgent need in ophthalmology for more cost effective instrumentation for the ear...
Danilo Motta, Luciana de Matos, Amanda Caniatto de...
SAC
2015
ACM
8 years 3 days ago
A grammatical approach to data-centric case management in a distributed collaborative environment
This paper presents a purely declarative approach to artifactcentric case management systems. Each case is presented as a tree-like structure; nodes bear information that combines...
Eric Badouel, Loïc Hélouët, Georg...
SAC
2015
ACM
8 years 3 days ago
A time-composable operating system for the Patmos processor
In the last couple of decades we have witnessed a steady growth in the complexity and widespread of real-time systems. In order to master the rising complexity in the timing behav...
Marco Ziccardi, Martin Schoeberl, Tullio Vardanega
SAC
2015
ACM
8 years 3 days ago
Evaluating defect prediction approaches using a massive set of metrics: an empirical study
To evaluate the performance of a within-project defect prediction approach, people normally use precision, recall, and F-measure scores. However, in machine learning literature, t...
Xiao Xuan, David Lo, Xin Xia, Yuan Tian
SAC
2015
ACM
8 years 3 days ago
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs
Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed ...
Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-...
SAC
2015
ACM
8 years 3 days ago
Alternating model trees
Model tree induction is a popular method for tackling regression problems requiring interpretable models. Model trees are decision trees with multiple linear regression models at ...
Eibe Frank, Michael Mayo, Stefan Kramer 0001
SAC
2015
ACM
8 years 3 days ago
Key correlation mining by simultaneous monotone and anti-monotone constraints checking
Correlated pattern mining has become increasingly an important task in data mining and knowledge discovery. In practice, the exploitation of correlated patterns is hampered by the...
Souad Bouasker, Sadok Ben Yahia
SAC
2015
ACM
8 years 3 days ago
Deep learning in partially-labeled data streams
Of the considerable research on data streams, relatively little deals with classification where only some of the instances in the stream are labeled. Most state-of-the-art data-s...
Jesse Read, Fernando Pérez-Cruz, Albert Bif...