Sciweavers

7379 search results - page 1189 / 1476
» How Many Clusters
Sort
View
ICST
2010
IEEE
15 years 2 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
IEEECIT
2010
IEEE
15 years 2 months ago
Fuzzy Location Service for Mobile Ad Hoc Networks
Abstract—Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location ...
Yongming Xie, Guojun Wang, Jie Wu
IEEEHPCS
2010
15 years 2 months ago
Portfolio-based Parallel SAT solving
Abstract. In this paper, we explore the two well-known principles of diversification and intensification in portfolio-based parallel SAT solving. These dual concepts play an impo...
Lakhdar Sais
IEEEHPCS
2010
15 years 2 months ago
No more crash or crunch: Sustainable credit dynamics in a P2P community
Abstract—Many peer-to-peer file sharing communities implement credit policies to incentivise users to contribute upload resources. Such policies implicitly assume a user model -...
Rameez Rahman, David Hales, Tamas Vinko, Johan A. ...
IJCCBS
2010
105views more  IJCCBS 2010»
15 years 2 months ago
Software safety: relating software assurance and software integrity
: The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, ...
Ibrahim Habli, Richard Hawkins, Tim Kelly
« Prev « First page 1189 / 1476 Last » Next »