Sciweavers

1775 search results - page 211 / 355
» Antichains on Three Levels
Sort
View
ISESE
2006
IEEE
15 years 7 months ago
Empirical estimates of software availability of deployed systems
We consider empirical evaluation of the availability of the deployed software. Evaluation of real systems is more realistic, more accurate, and provides higher level of confidenc...
Audris Mockus
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 7 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak
ACMICEC
2006
ACM
186views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Distrust and trust in B2C e-commerce: do they differ?
Researchers have not studied e-commerce distrust as much as ecommerce trust. This study examines whether trust and distrust are distinct concepts. If trust and distrust are the sa...
D. Harrison McKnight, Vivek Choudhury
APGV
2006
ACM
196views Visualization» more  APGV 2006»
15 years 7 months ago
Semantic 3D motion retargeting for facial animation
We present a system for realistic facial animation that decomposes facial motion capture data into semantically meaningful motion channels based on the Facial Action Coding System...
Cristóbal Curio, Martin Breidt, Mario Klein...
MSR
2006
ACM
15 years 7 months ago
Fine grained indexing of software repositories to support impact analysis
Versioned and bug-tracked software systems provide a huge amount of historical data regarding source code changes and issues management. In this paper we deal with impact analysis...
Gerardo Canfora, Luigi Cerulo