Sciweavers

549 search results - page 75 / 110
» Belief-Based Risk Analysis
Sort
View
ICECCS
1999
IEEE
83views Hardware» more  ICECCS 1999»
15 years 4 months ago
A Framework for Analyzing Configurations of Deployable Software Systems
Configuring and deploying a large software system is complicated when the system is composed of components and when there are numerous possible configurations for the system. In s...
Dennis Heimbigner, Richard S. Hall, Alexander L. W...
RE
2010
Springer
14 years 10 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
MSOM
2010
65views more  MSOM 2010»
14 years 6 months ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho
BMCBI
2005
101views more  BMCBI 2005»
14 years 11 months ago
MASQOT: a method for cDNA microarray spot quality control
Background: cDNA microarray technology has emerged as a major player in the parallel detection of biomolecules, but still suffers from fundamental technical problems. Identifying ...
Max Bylesjö, Daniel Eriksson, Andreas Sjö...
ICML
2008
IEEE
16 years 19 days ago
Query-level stability and generalization in learning to rank
This paper is concerned with the generalization ability of learning to rank algorithms for information retrieval (IR). We point out that the key for addressing the learning proble...
Yanyan Lan, Tie-Yan Liu, Tao Qin, Zhiming Ma, Hang...