Sciweavers

956 search results - page 123 / 192
» Source Constrained Clustering
Sort
View
FASE
2007
Springer
15 years 4 months ago
EQ-Mine: Predicting Short-Term Defects for Software Evolution
We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Jacek Ratzinger, Martin Pinzger, Harald Gall
ICISS
2007
Springer
15 years 4 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
ICMCS
2005
IEEE
197views Multimedia» more  ICMCS 2005»
15 years 3 months ago
An adaptive microphone array with local acoustic sensitivity
In this paper, a microphone array with 3-D focal zone is proposed. The microphone array consists of one omni-directional and two uni-directional microphones. The microphone array ...
Jianfeng Chen, Louis Shue, Hanwu Sun, Koksoon Phua
IEEEINTERACT
2003
IEEE
15 years 3 months ago
Procedure Cloning and Integration for Converting Parallelism from Coarse to Fine Grain
This paper introduces a method for improving program run-time performance by gathering work in an application and executing it efficiently in an integrated thread. Our methods ext...
Won So, Alexander G. Dean
ICEIS
2002
IEEE
15 years 2 months ago
Modeling Relational Data by the Adjacency Model
: The World-Wide-Web contains data that cannot be constrained by a schema. Another source for such data is heterogenous corporate systems which are integrated in order to get bette...
Jari Töyli, Matti Linna, Merja Wanne