Sciweavers

3555 search results - page 702 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
105
Voted
DEBS
2010
ACM
15 years 1 months ago
Evaluation of streaming aggregation on parallel hardware architectures
We present a case study parallelizing streaming aggregation on three different parallel hardware architectures. Aggregation is a performance-critical operation for data summarizat...
Scott Schneider, Henrique Andrade, Bugra Gedik, Ku...
KBSE
2005
IEEE
15 years 3 months ago
Automated test generation for engineering applications
In test generation based on model-checking, white-box test criteria are represented as trap conditions written in a temporal logic. A model checker is used to refute trap conditio...
Songtao Xia, Ben Di Vito, César Muño...
67
Voted
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
15 years 2 months ago
Duration in the Digital Economy
We examine the drivers of Internet firm survival using a multi-method survival analysis. Based on previous literature on business failure and recent IS research on e-commerce busi...
Robert J. Kauffman, Bin Wang
VLDB
2000
ACM
229views Database» more  VLDB 2000»
15 years 1 months ago
Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces
Many emerging application domains require database systems to support efficient access over highly multidimensional datasets. The current state-of-the-art technique to indexing hi...
Kaushik Chakrabarti, Sharad Mehrotra
GECCO
2008
Springer
186views Optimization» more  GECCO 2008»
14 years 10 months ago
A pareto following variation operator for fast-converging multiobjective evolutionary algorithms
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder, Michael Kirley, Ra...