Sciweavers

549 search results - page 80 / 110
» Belief-Based Risk Analysis
Sort
View
FUIN
2007
147views more  FUIN 2007»
14 years 11 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
RE
2008
Springer
14 years 11 months ago
A Case Study in Eliciting Scalability Requirements
Scalability is widely recognized as an important software quality, but it is a quality that historically has lacked a consistent and systematic treatment. To address this problem,...
Leticia Duboc, Emmanuel Letier, David S. Rosenblum...
WCRE
2010
IEEE
14 years 10 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...
ICIAR
2009
Springer
14 years 9 months ago
Score Level Fusion of Ear and Face Local 3D Features for Fast and Expression-Invariant Human Recognition
Abstract. Increasing risks of spoof attacks and other common problems of unimodal biometric systems such as intra-class variations, nonuniversality and noisy data necessitate the u...
Syed M. S. Islam, Mohammed Bennamoun, Ajmal S. Mia...
EOR
2011
127views more  EOR 2011»
14 years 6 months ago
Methodology for determining the acceptability of system designs in uncertain environments
In practice, managers often wish to ascertain that a particular engineering design of a production system meets their requirements. The future environment of this design is likely...
Jack P. C. Kleijnen, Henri Pierreval, Jin Zhang