Sciweavers

360 search results - page 64 / 72
» Developing an Ontology for the Domain Name System
Sort
View
ISSTA
2009
ACM
15 years 4 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
CBRMD
2008
167views more  CBRMD 2008»
14 years 9 months ago
Case-based Reasoning for Diagnosis of Stress using Enhanced Cosine and Fuzzy Similarity
Intelligent analysis of heterogeneous data and information sources for efficient decision support presents an interesting yet challenging task in clinical environments. This is par...
Mobyen Uddin Ahmed, Shahina Begum, Peter Funk, Nin...
ER
1997
Springer
145views Database» more  ER 1997»
15 years 1 months ago
Enterprise Knowledge Management and Conceptual Modelling
Turbulence is in the nature of business environments. Changes brought about because of different requirements such as social, political, technical and economic, exert pressures on ...
Pericles Loucopoulos, Vagelio Kavakli
EMSOFT
2007
Springer
15 years 3 months ago
A dynamic scheduling approach to designing flexible safety-critical systems
The design of safety-critical systems has typically adopted static techniques to simplify error detection and fault tolerance. However, economic pressure to reduce costs is exposi...
Luís Almeida, Sebastian Fischmeister, Madhu...
SIGOPSE
2004
ACM
15 years 3 months ago
Open problems in data collection networks
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of ...
Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Me...