Sciweavers

1776 search results - page 132 / 356
» Hypothesis Testing for Module Test in Software Development
Sort
View
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
16 years 3 months ago
Discovering significant rules
In many applications, association rules will only be interesting if they represent non-trivial correlations between all constituent items. Numerous techniques have been developed ...
Geoffrey I. Webb
101
Voted
IWANN
2001
Springer
15 years 7 months ago
A Realistic Computational Model of the Local Circuitry of the Cuneate Nucleus
Abstract. Intracellular recordings obtained under cutaneous and lemniscal stimulation show that the afferent fibers can establish excitatory and inhibitory synaptic connections w...
Eduardo Sánchez Vila, Senén Barro, J...
ICSE
2000
IEEE-ACM
15 years 6 months ago
Producing more reliable software: mature software engineering process vs. state-of-the-art technology?
: Producing More Reliable Software: Mature Software Engineering Process vs. State-of-the-Art Technology? A customer of high assurance software recently sponsored a software enginee...
James C. Widmaier
IJCCBS
2010
105views more  IJCCBS 2010»
15 years 1 months ago
Software safety: relating software assurance and software integrity
: The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, ...
Ibrahim Habli, Richard Hawkins, Tim Kelly
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
15 years 7 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser