Sciweavers

423 search results - page 71 / 85
» Using Test Suites in Evaluation of Machine Translation Syste...
Sort
View
ISSRE
2007
IEEE
14 years 11 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
HPDC
2009
IEEE
15 years 4 months ago
TakTuk, adaptive deployment of remote executions
This article deals with TakTuk, a middleware that deploys efficiently parallel remote executions on large scale grids (thousands of nodes). This tool is mostly intended for intera...
Benoit Claudel, Guillaume Huard, Olivier Richard
67
Voted
INFOCOM
2009
IEEE
15 years 4 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
PRIMA
2007
Springer
15 years 3 months ago
An Agent Modeling Method Based on Scenario Rehearsal for Multiagent Simulation
Multiagent Systems are potential computational systems for various practical applications, tools, and so on. Multiagent simulation is one of the remarkable application to evaluate ...
Shohei Yamane, Toru Ishida
SOCO
2010
Springer
14 years 4 months ago
Taximeter verification with GPS and soft computing techniques
Until recently, local governments in Spain were using machines with rolling cylinders for verifying taximeters. However, the condition of the tires can lead to errors in the proces...
José Villar, Adolfo Otero, José Oter...