Sciweavers

6181 search results - page 1097 / 1237
» Predictive Matrix-Variate t Models
Sort
View
KBSE
2009
IEEE
15 years 10 months ago
Design Rule Hierarchies and Parallelism in Software Development Tasks
—As software projects continue to grow in scale, being able to maximize the work that developers can carry out in parallel as a set of concurrent development tasks, without incur...
Sunny Wong, Yuanfang Cai, Giuseppe Valetto, Georgi...
ICDM
2009
IEEE
122views Data Mining» more  ICDM 2009»
15 years 10 months ago
Detecting and Interpreting Variable Interactions in Observational Ornithology Data
In this paper we demonstrate a practical approach to interaction detection on real data describing the abundance of different species of birds in the prairies east of the souther...
Daria Sorokina, Rich Caruana, Mirek Riedewald, Wes...
ICST
2009
IEEE
15 years 10 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
IEEECIT
2009
IEEE
15 years 10 months ago
Unifying Runtime Adaptation and Design Evolution
Abstract—The increasing need for continuously available software systems has raised two key-issues: self-adaptation and design evolution. The former one requires software systems...
Brice Morin, Thomas Ledoux, Mahmoud Ben Hassine, F...
INFOCOM
2009
IEEE
15 years 10 months ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu
« Prev « First page 1097 / 1237 Last » Next »