Sciweavers

1253 search results - page 133 / 251
» Exploration Testing
Sort
View
108
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Sampling Biases in IP Topology Measurements
— Considerable attention has been focused on the properties of graphs derived from Internet measurements. Router-level topologies collected via traceroute-like methods have led s...
Anukool Lakhina, John W. Byers, Mark Crovella, Pen...
SOFTVIS
2003
ACM
15 years 7 months ago
Visualization of Program-Execution Data for Deployed Software
Software products are often released with missing functionality, errors, or incompatibilities that may result in failures in the field, inferior performances, or, more generally,...
Alessandro Orso, James A. Jones, Mary Jean Harrold
106
Voted
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 7 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
102
Voted
STOC
1998
ACM
125views Algorithms» more  STOC 1998»
15 years 6 months ago
Spot-Checkers
On Labor Day weekend, the highway patrol sets up spot-checks at random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectl...
Funda Ergün, Sampath Kannan, Ravi Kumar, Roni...
ICANNGA
2009
Springer
163views Algorithms» more  ICANNGA 2009»
15 years 6 months ago
Elitistic Evolution: An Efficient Heuristic for Global Optimization
A new evolutionary algorithm, Elitistic Evolution (termed EEv), is proposed in this paper. EEv is an evolutionary method for numerical optimization with adaptive behavior. EEv uses...
Francisco Viveros Jiménez, Efrén Mez...