Sciweavers

3018 search results - page 569 / 604
» Leveraging the
Sort
View
ESEM
2010
ACM
14 years 10 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ICOODB
2010
117views Database» more  ICOODB 2010»
14 years 10 months ago
iBLOB: Complex Object Management in Databases through Intelligent Binary Large Objects
Abstract. New emerging applications including genomic, multimedia, and geospatial technologies have necessitated the handling of complex application objects that are highly structu...
Tao Chen, Arif Khan, Markus Schneider, Ganesh Visw...
ICRA
2010
IEEE
202views Robotics» more  ICRA 2010»
14 years 10 months ago
A robust state estimation method against GNSS outage for unmanned miniature helicopters
Abstract— Most unmanned aerial robots use a Global Navigation Satellite System (GNSS), such as GPS, GLONASS, and Galileo, for their navigation. However, from time to time the GNS...
Tak-Kit Lau, Yun-hui Liu, Kai-wun Lin
ICST
2010
IEEE
14 years 10 months ago
Automated Behavioral Regression Testing
—When a program is modified during software evolution, developers typically run the new version of the program against its existing test suite to validate that the changes made ...
Wei Jin, Alessandro Orso, Tao Xie
JSAC
2008
109views more  JSAC 2008»
14 years 10 months ago
Elastic service availability: utility framework and optimal provisioning
Service availability is one of the most closely scrutinized metrics in offering network services. It is important to cost-effectively provision a managed and differentiated networ...
Dahai Xu, Ying Li, Mung Chiang, A. Robert Calderba...