Sciweavers

2947 search results - page 401 / 590
» Analyzing Program Analyses
Sort
View
116
Voted
SIGIR
2000
ACM
15 years 6 months ago
Evaluating evaluation measure stability
: This paper presents a novel way of examining the accuracy of the evaluation measures commonly used in information retrieval experiments. It validates several of the rules-of-thum...
Chris Buckley, Ellen M. Voorhees
135
Voted
ICSE
1999
IEEE-ACM
15 years 6 months ago
A Language and Environment for Architecture-Based Software Development and Evolution
Software architectures have the potential to substantially improve the development and evolution of large, complex, multi-lingual, multi-platform, long-running systems. However, i...
Nenad Medvidovic, David S. Rosenblum, Richard N. T...
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 6 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
CCS
2006
ACM
15 years 6 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
SC
1995
ACM
15 years 6 months ago
Input/Output Characteristics of Scalable Parallel Applications
Rapid increases in computing and communication performance are exacerbating the long-standing problem of performance-limited input/output. Indeed, for many otherwise scalable para...
Phyllis Crandall, Ruth A. Aydt, Andrew A. Chien, D...