Sciweavers

1253 search results - page 143 / 251
» Exploration Testing
Sort
View
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 7 months ago
Information Technology Fashions: Lifecycle Phase Analysis
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Jintae Lee, Emilio Collar Jr.
106
Voted
MUC
1992
15 years 6 months ago
GE-CMU: description of the TIPSTER/SHOGUN system as used for MUC-4
The GE-CMU team is developing the TIPSTER/SHOGUN system under the governmentsponsored TIPSTER program, which aims to advance coverage, accuracy, and portability in tex t interpret...
Paul S. Jacobs, George B. Krupka, Lisa F. Rau, Tod...
135
Voted
NETWORKING
2004
15 years 4 months ago
On Detection of Anomalous Routing Dynamics in BGP
BGP, the de facto inter-domain routing protocol, is the core component of current Internet infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing dy...
Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, ...
159
Voted
BMCBI
2006
195views more  BMCBI 2006»
15 years 2 months ago
Hubs of knowledge: using the functional link structure in Biozon to mine for biologically significant entities
Background: Existing biological databases support a variety of queries such as keyword or definition search. However, they do not provide any measure of relevance for the instance...
Paul Shafer, Timothy Isganitis, Golan Yona
ASPLOS
2011
ACM
14 years 6 months ago
ConSeq: detecting concurrency bugs through sequential errors
Concurrency bugs are caused by non-deterministic interleavings between shared memory accesses. Their effects propagate through data and control dependences until they cause softwa...
Wei Zhang, Junghee Lim, Ramya Olichandran, Joel Sc...