Sciweavers

1548 search results - page 294 / 310
» Estimating Software Vulnerabilities
Sort
View
WWW
2010
ACM
15 years 4 months ago
Money, glory and cheap talk: analyzing strategic behavior of contestants in simultaneous crowdsourcing contests on TopCoder.com
Crowdsourcing is a new Web phenomenon, in which a firm takes a function once performed in-house and outsources it to a crowd, usually in the form of an open contest. Designing ef...
Nikolay Archak
EVOW
2010
Springer
15 years 4 months ago
Parameter Tuning of Evolutionary Algorithms: Generalist vs. Specialist
Abstract. Finding appropriate parameter values for Evolutionary Algorithms (EAs) is one of the persistent challenges of Evolutionary Computing. In recent publications we showed how...
Selmar K. Smit, A. E. Eiben
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 4 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
INFOCOM
2009
IEEE
15 years 4 months ago
Extreme Value FEC for Wireless Data Broadcasting
Abstract—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting ...
Weiyao Xiao, David Starobinski
VRST
2009
ACM
15 years 4 months ago
Standalone edge-based markerless tracking of fully 3-dimensional objects for handheld augmented reality
This paper presents a markerless tracking technique targeted to the Windows Mobile Pocket PC platform. The primary aim of this work is to allow the development of standalone augme...
João Paulo S. M. Lima, Veronica Teichrieb, ...