In many applications, decision making under uncertainty often involves two steps- prediction of a certain quality parameter or indicator of the system under study and the subseque...
BACKGROUND: Defect predictors learned from static code measures can isolate code modules with a higher than usual probability of defects. AIMS: To improve those learners by focusi...
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
—The purpose of this paper is to compare two interference avoidance techniques for time division duplex (TDD) wireless networks, viz.: a novel technique termed asymmetry balancin...
Transparency in 3D graphics has traditionally been created by ordering the transparent objects from back-to-front with respect to the viewpoint, and rendering the opaque objects ï...