Sciweavers

2194 search results - page 190 / 439
» Improving HLRTA*( k )
Sort
View
CCS
2008
ACM
15 years 3 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
ISSTA
2010
ACM
15 years 3 months ago
Causal inference for statistical fault localization
This paper investigates the application of causal inference methodology for observational studies to software fault localization based on test outcomes and profiles. This methodo...
George K. Baah, Andy Podgurski, Mary Jean Harrold
ITS
2010
Springer
176views Multimedia» more  ITS 2010»
15 years 3 months ago
A Time for Emoting: When Affect-Sensitivity Is and Isn't Effective at Promoting Deep Learning
We have developed and evaluated an affect-sensitive version of AutoTutor, a dialogue based ITS that simulates human tutors. While the original AutoTutor is sensitive to learners’...
Sidney K. D'Mello, Blair Lehman, Jeremiah Sullins,...
ASPDAC
2005
ACM
81views Hardware» more  ASPDAC 2005»
15 years 3 months ago
Power estimation starategies for a low-power security processor
In this paper, we present the power estimation methodologies for the development of a low-power security processor that contains significant amount of logic and memory. For the lo...
Yen-Fong Lee, Shi-Yu Huang, Sheng-Yu Hsu, I-Ling C...
102
Voted
ASSETS
2005
ACM
15 years 3 months ago
Visualizing non-speech sounds for the deaf
Sounds constantly occur around us, keeping us aware of our surroundings. People who are deaf have difficulty maintaining an awareness of these ambient sounds. We present an invest...
Tara Matthews, Janette Fong, Jennifer Mankoff