Sciweavers

2500 search results - page 385 / 500
» Specifying Behavior in C
Sort
View
130
Voted
FASE
2009
Springer
15 years 7 months ago
Mining API Error-Handling Specifications from Source Code
Abstract. API error-handling specifications are often not documented, necessitating automated specification mining. Automated mining of error-handling specifications is challenging...
Mithun Acharya, Tao Xie
HRI
2007
ACM
15 years 7 months ago
Comparing a computer agent with a humanoid robot
HRI researchers interested in social robots have made large investments in humanoid robots. There is still sparse evidence that peoples' responses to robots differ from their...
Aaron Powers, Sara B. Kiesler, Susan R. Fussell, C...
CEAS
2006
Springer
15 years 7 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
144
Voted
CIKM
2006
Springer
15 years 7 months ago
Topic evolution and social interactions: how authors effect research
We propose a method for discovering the dependency relationships between the topics of documents shared in social networks using the latent social interactions, attempting to answ...
Ding Zhou, Xiang Ji, Hongyuan Zha, C. Lee Giles
156
Voted
EGICE
2006
15 years 7 months ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith