Sciweavers

1260 search results - page 228 / 252
» The Role of Models in Leveraging Information
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
Does a programmer's activity indicate knowledge of code?
The practice of software development can likely be improved if an externalized model of each programmer's knowledge of a particular code base is available. Some tools already...
Thomas Fritz, Gail C. Murphy, Emily Hill
KDD
2008
ACM
156views Data Mining» more  KDD 2008»
15 years 10 months ago
Can complex network metrics predict the behavior of NBA teams?
The United States National Basketball Association (NBA) is one of the most popular sports league in the world and is well known for moving a millionary betting market that uses th...
Antonio Alfredo Ferreira Loureiro, Pedro O. S. Vaz...
CCECE
2006
IEEE
15 years 3 months ago
Evaluation of RNA Secondary Structure Motifs using Regression Analysis
Recent experimental evidences have shown that ribonucleic acid (RNA) plays a greater role in the cell than previously thought. An ensemble of RNA sequences believed to contain sig...
Mohammad Anwar, Marcel Turcotte
ATAL
2004
Springer
15 years 3 months ago
Strategic Deception in Agents
CHRISTIAN, DAVID B. Strategic Deception in Agents. (Under the direction of Assistant Professor R. Michael Young). Despite its negative ethical connotations, deception is a useful ...
David B. Christian, R. Michael Young
ICDCS
2010
IEEE
15 years 1 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...