Sciweavers

196 search results - page 34 / 40
» Examining risk attitudes
Sort
View
CSMR
1998
IEEE
15 years 4 months ago
A Method for Assessing Legacy Systems for Evolution
Legacy systems are usually critical to the business in which they operate, but the costs of running them are often not justifiable. Determining whether such systems are worth keep...
Jane Ransom, Ian Sommerville, Ian Warren
EUROPAR
2008
Springer
15 years 1 months ago
Empirical Analysis of a Large-Scale Hierarchical Storage System
To prepare for future peta- or exa-scale computing, it is important to gain a good understanding on what impacts a hierarchical storage system would have on the performance of data...
Weikuan Yu, Sarp Oral, Shane Canon, Jeffrey S. Vet...
NIPS
2001
15 years 1 months ago
Online Learning with Kernels
Abstract--Kernel-based algorithms such as support vector machines have achieved considerable success in various problems in batch setting, where all of the training data is availab...
Jyrki Kivinen, Alex J. Smola, Robert C. Williamson
ASWEC
2010
IEEE
14 years 12 months ago
On the Use of Properties in Java Applications
—When building software systems, developers have to weigh the benefits of using one specific solution approach against the risks and costs of using another one. This process is...
Markus Lumpe, Samrian Mahmud, Rajesh Vasa
ESE
2008
112views Database» more  ESE 2008»
14 years 11 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey