Sciweavers

686 search results - page 121 / 138
» Tradeoff analysis between knowledge assessment approaches
Sort
View
VISAPP
2010
14 years 7 months ago
Inverse Problems in Imaging and Computer Vision - From Regularization Theory to Bayesian Inference
phies are also mentioned and a common mathematical abstraction for all these inverses problems will be presented. By focusing on a simple linear forward model, first a synthetic an...
Ali Mohammad-Djafari
CLOUDCOM
2010
Springer
14 years 6 months ago
Usage Patterns to Provision for Scientific Experimentation in Clouds
Abstract--Driven by the need to provision resources on demand, scientists are turning to commercial and research test-bed Cloud computing resources to run their scientific experime...
Eran Chinthaka Withana, Beth Plale
91
Voted
IWPC
2000
IEEE
15 years 1 months ago
Tracing Object-Oriented Code into Functional Requirements
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual page...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
79
Voted
WCRE
1999
IEEE
15 years 1 months ago
Recovering Code to Documentation Links in OO Systems
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual pages...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia