Sciweavers

3555 search results - page 591 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
TWC
2010
14 years 8 months ago
Joint channel estimation and resource allocation for MIMO systems-part I: single-user analysis
Multiple antenna systems are known to provide very large data rates, when the perfect channel state information (CSI) is available at the receiver. However, this requires the recei...
Alkan Soysal, Sennur Ulukus
WOSP
2005
ACM
15 years 7 months ago
Performance evaluation of UML software architectures with multiclass Queueing Network models
Software performance based on performance models can be applied at early phases of the software development cycle to characterize the quantitative behavior of software systems. We...
Simonetta Balsamo, Moreno Marzolla
IAJIT
2007
90views more  IAJIT 2007»
15 years 1 months ago
Software Reuse for Mobile Robot Applications Through Analysis Patterns
: Software analysis pattern is an approach of software reuse which provides a way to reuse expertise that can be used across domains at early level of development. Developing softw...
Dayang N. A. Jawawi, Safaai Deris, Rosbi Mamat
SIGSOFT
2009
ACM
16 years 2 months ago
Improving bug triage with bug tossing graphs
A bug report is typically assigned to a single developer who is then responsible for fixing the bug. In Mozilla and Eclipse, between 37%-44% of bug reports are "tossed" ...
Gaeul Jeong, Sunghun Kim, Thomas Zimmermann

Publication
253views
14 years 11 months ago
Multisensory Oddity Detection as Bayesian Inference
A key goal for the perceptual system is to optimally combine information from all the senses that may be available in order to develop the most accurate and unified picture possi...
Timothy Hospedales and Sethu Vijayakumar