Sciweavers

699 search results - page 81 / 140
» mc 2008
Sort
View
102
Voted
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
15 years 7 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
82
Voted
ICASSP
2008
IEEE
15 years 7 months ago
A compressive beamforming method
Compressive Sensing (CS) is an emerging area which uses a relatively small number of non-traditional samples in the form of randomized projections to reconstruct sparse or compres...
Ali Cafer Gurbuz, James H. McClellan, Volkan Cevhe...
QEST
2008
IEEE
15 years 7 months ago
CaVi -- Simulation and Model Checking for Wireless Sensor Networks
CaVi provides a uniform interface to state-of-the-art simulation methods and formal verification methods for wireless sensor network. Simulation is suitable to examine the behavi...
Athanassios Boulis, Ansgar Fehnker, Matthias Fruth...
125
Voted
WSC
2008
15 years 2 months ago
Queueing models for single machine manufacturing systems with interruptions
Queueing theory is a well-known method for evaluating the performance of manufacturing systems. When we want to analyze the performance of a single machine, M/M/1 queues or approx...
Kan Wu, Leon F. McGinnis, Bert Zwart
94
Voted
GECCO
2008
Springer
112views Optimization» more  GECCO 2008»
15 years 1 months ago
Handling dynamic data structures in search based testing
There has been little attention to search based test data generation in the presence of pointer inputs and dynamic data structures, an area in which recent concolic methods have e...
Kiran Lakhotia, Mark Harman, Phil McMinn