Sciweavers

1419 search results - page 103 / 284
» Notes on Formalizing Context
Sort
View
FIW
1998
130views Communications» more  FIW 1998»
15 years 2 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
93
Voted
ICML
2005
IEEE
16 years 1 months ago
ROC confidence bands: an empirical evaluation
This paper is about constructing confidence bands around ROC curves. We first introduce to the machine learning community three band-generating methods from the medical field, and...
Sofus A. Macskassy, Foster J. Provost, Saharon Ros...
92
Voted
CHI
2005
ACM
16 years 1 months ago
Stencils-based tutorials: design and evaluation
Users of traditional tutorials and help systems often have difficulty finding the components described or pictured in the procedural instructions. Users also unintentionally miss ...
Caitlin Kelleher, Randy Pausch
92
Voted
ICSE
2007
IEEE-ACM
16 years 25 days ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
ALT
2002
Springer
15 years 9 months ago
Optimally-Smooth Adaptive Boosting and Application to Agnostic Learning
We describe a new boosting algorithm that is the first such algorithm to be both smooth and adaptive. These two features make possible performance improvements for many learning ...
Dmitry Gavinsky