Sciweavers

19936 search results - page 3832 / 3988
» Inductive process modeling
Sort
View
ESEM
2010
ACM
15 years 1 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
JTAER
2008
118views more  JTAER 2008»
15 years 1 months ago
Service and Document Based Interoperability for European eCustoms Solutions
Innovative eCustoms solutions play an important role in the pan-European eGovernment strategy. The underlying premise is interoperability postulating a common understanding of pro...
Tobias Vogel, Alexander Schmidt, Alexander Lemm, H...
ISSRE
2010
IEEE
15 years 1 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra
ITIIS
2010
240views more  ITIIS 2010»
15 years 1 months ago
Super-Resolution Iris Image Restoration using Single Image for Iris Recognition
Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; howeve...
Kwang Yong Shin, Byung Jun Kang, Kang Ryoung Park
JAIR
2010
106views more  JAIR 2010»
15 years 1 months ago
Cooperative Games with Overlapping Coalitions
In the usual models of cooperative game theory, the outcome of a coalition formation process is either the grand coalition or a coalition structure that consists of disjoint coali...
Georgios Chalkiadakis, Edith Elkind, Evangelos Mar...
« Prev « First page 3832 / 3988 Last » Next »