Sciweavers

801 search results - page 81 / 161
» Robust Nonproprietary Software
Sort
View
RE
2002
Springer
14 years 9 months ago
Automating Speculative Queries through Event-Based Requirements Traceability
Posing speculative questions about a software system is an important yet often unsupported activity. Current impact analysis techniques tend to focus upon the functionality of the...
Jane Cleland-Huang, Carl K. Chang, Gaurav Sethi, K...
KBSE
2010
IEEE
14 years 8 months ago
A program differencing algorithm for verilog HDL
During code review tasks, comparing two versions of a hardware design description using existing program differencing tools such as diff is inherently limited because existing p...
Adam Duley, Chris Spandikow, Miryung Kim
COMPSAC
2010
IEEE
14 years 7 months ago
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
15 years 10 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...

Publication
1301views
15 years 10 months ago
Markovian Tracking-by-Detection from a Single, Uncalibrated Camera
We present an algorithm for multi-person tracking-bydetection in a particle filtering framework. To address the unreliability of current state-of-the-art object detectors, our a...
Michael D. Breitenstein, Fabian Reichlin, Bastian ...