Sciweavers

1465 search results - page 285 / 293
» Making the Correct Mistakes
Sort
View
JSS
2010
120views more  JSS 2010»
14 years 8 months ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...
MANSCI
2010
105views more  MANSCI 2010»
14 years 8 months ago
Revenue Management with Strategic Customers: Last-Minute Selling and Opaque Selling
Companies in a variety of industries (e.g., airlines, hotels, theaters) often use last-minute sales to dispose of unsold capacity. Although this may generate incremental revenues ...
Kinshuk Jerath, Serguei Netessine, Senthil K. Veer...
OOPSLA
2010
Springer
14 years 8 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
SEE
2010
Springer
14 years 8 months ago
Can Instruction in Engineering Ethics Change Students' Feelings about Professional Responsibility?
How can a course on engineering ethics affect an undergraduate student’s feelings of responsibility about moral problems? In this study, three groups of students were interviewed...
Golnaz Hashemian, Michael C. Loui
VTC
2010
IEEE
153views Communications» more  VTC 2010»
14 years 8 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...