Analyzing data to find trends, correlations, and stable patterns is an important task in many industrial applications. This paper proposes a new technique based on parallel coordi...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
This paper describes MEXAR2, a software tool that is currently used to synthesize the operational commands for data downlink from the on-board memory of an interplanetary space mi...
Feature models are widely used to model software product-line (SPL) variability. SPL variants are configured by selecting feature sets that satisfy feature model constraints. Conf...
Jules White, Douglas C. Schmidt, David Benavides, ...
In this paper we analyze and evaluate the effects of some pre-defined process parameters on the performance of a manufacturing system. These parameters include two different plant...