Sciweavers

3021 search results - page 575 / 605
» A Domain Engineering Approach for Situational Method Enginee...
Sort
View
163
Voted
AIIA
2007
Springer
15 years 9 months ago
A Hierarchical Clustering Procedure for Semantically Annotated Resources
Abstract. A clustering method is presented which can be applied to relational knowledge bases. It can be used to discover interesting groupings of resources through their (semantic...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
159
Voted
CCS
2007
ACM
15 years 7 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
117
Voted
AAAI
2006
15 years 5 months ago
Identification and Evaluation of Weak Community Structures in Networks
Identifying intrinsic structures in large networks is a fundamental problem in many fields, such as engineering, social science and biology. In this paper, we are concerned with c...
Jianhua Ruan, Weixiong Zhang
TASLP
2010
134views more  TASLP 2010»
14 years 10 months ago
Multiple Fundamental Frequency Estimation by Modeling Spectral Peaks and Non-Peak Regions
This paper presents a maximum likelihood approach to multiple fundamental frequency (F0) estimation for a mixture of harmonic sound sources, where the power spectrum of a time fra...
Zhiyao Duan, Bryan Pardo, Changshui Zhang
146
Voted
SIGCSE
2008
ACM
143views Education» more  SIGCSE 2008»
15 years 3 months ago
Test-driven learning in early programming courses
Coercing new programmers to adopt disciplined development practices such as thorough unit testing is a challenging endeavor. Test-driven development (TDD) has been proposed as a s...
David Janzen, Hossein Saiedian