Sciweavers

3428 search results - page 127 / 686
» Making the Case
Sort
View
ICST
2009
IEEE
15 years 5 months ago
On the Effectiveness of Test Extraction without Overhead
Developers write and execute ad-hoc tests as they implement software. While these tests reflect important insights of the developers (e.g., which parts of the software need testi...
Andreas Leitner, Alexander Pretschner, Stefan Mori...
EPEW
2009
Springer
15 years 5 months ago
Passage-End Analysis
Abstract. Passage-end calculations are a new style of passage measurement for eXtended Stochastic Probes (XSP) [1] which add the ability to split the analysis into several cases de...
Allan Clark, Adam Duguid, Stephen Gilmore
CRV
2007
IEEE
116views Robotics» more  CRV 2007»
15 years 5 months ago
A non-myopic approach to visual search
We show how a greedy approach to visual search — i.e., directly moving to the most likely location of the target — can be suboptimal, if the target object is hard to detect. I...
Julia Vogel, Kevin Murphy
IWPC
2006
IEEE
15 years 5 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
SIGMOD
2008
ACM
141views Database» more  SIGMOD 2008»
14 years 10 months ago
Building the WorldWide Telescope
This paper is talks about the critical role that Jim Gray played in the creation of the WorldWide Telescope software. Contrary to what you might think it wasn't his database ...
Curtis Wong