Sciweavers

10055 search results - page 1448 / 2011
» Structured programming using processes
Sort
View
SQJ
2002
90views more  SQJ 2002»
15 years 4 months ago
Critical Analysis of the PIE Testability Technique
Abstract. The work of Voas and colleagues has introduced, refined and applied the propagation, infection and execution (PIE) analysis technique for measuring testability of program...
Zuhoor A. Al-Khanjari, Martin R. Woodward, Haider ...
RAID
2010
Springer
15 years 3 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
TCBB
2010
89views more  TCBB 2010»
15 years 3 months ago
Model Composition for Macromolecular Regulatory Networks
—Models of regulatory networks become more difficult to construct and understand as they grow in size and complexity. Large models are usually built up from smaller models, repre...
Ranjit Randhawa, Clifford A. Shaffer, John J. Tyso...
ICMLA
2009
15 years 2 months ago
Automatic Feature Selection for Model-Based Reinforcement Learning in Factored MDPs
Abstract--Feature selection is an important challenge in machine learning. Unfortunately, most methods for automating feature selection are designed for supervised learning tasks a...
Mark Kroon, Shimon Whiteson
PPDP
2004
Springer
15 years 10 months ago
JIAD: a tool to infer design patterns in refactoring
Refactoring in object-orientation has gained increased attention due to its ability to improve design quality. Refactoring using design patterns (DPs) leads to production of high ...
J. Rajesh, D. Janakiram
« Prev « First page 1448 / 2011 Last » Next »