Sciweavers

3070 search results - page 574 / 614
» Evaluating digital libraries
Sort
View
GECCO
2010
Springer
187views Optimization» more  GECCO 2010»
15 years 6 months ago
The maximum hypervolume set yields near-optimal approximation
In order to allow a comparison of (otherwise incomparable) sets, many evolutionary multiobjective optimizers use indicator functions to guide the search and to evaluate the perfor...
Karl Bringmann, Tobias Friedrich
ICSE
2010
IEEE-ACM
15 years 6 months ago
Adaptive bug isolation
Statistical debugging uses lightweight instrumentation and statistical models to identify program behaviors that are strongly predictive of failure. However, most software is most...
Piramanayagam Arumuga Nainar, Ben Liblit
NOSSDAV
2010
Springer
15 years 6 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
SIGMOD
2009
ACM
165views Database» more  SIGMOD 2009»
15 years 6 months ago
Query by output
It has recently been asserted that the usability of a database is as important as its capability. Understanding the database schema, the hidden relationships among attributes in t...
Quoc Trung Tran, Chee-Yong Chan, Srinivasan Partha...
GIS
2009
ACM
15 years 6 months ago
Focus+Glue+Context: an improved fisheye approach for web map services
This paper proposes a method for generating a Focus+Glue +Context map for Web map services by improving existing fisheye views methods for cartographic data. While many studies h...
Daisuke Yamamoto, Shotaro Ozeki, Naohisa Takahashi