Sciweavers

2342 search results - page 405 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
INFFUS
2002
162views more  INFFUS 2002»
13 years 8 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
SIGSOFT
2007
ACM
14 years 9 months ago
Measuring empirical computational complexity
The standard language for describing the asymptotic behavior of algorithms is theoretical computational complexity. We propose a method for describing the asymptotic behavior of p...
Simon Goldsmith, Alex Aiken, Daniel Shawcross Wilk...
GECCO
2010
Springer
196views Optimization» more  GECCO 2010»
14 years 1 months ago
Using synthetic test suites to empirically compare search-based and greedy prioritizers
The increase in the complexity of modern software has led to the commensurate growth in the size and execution time of the test suites for these programs. In order to address this...
Zachary D. Williams, Gregory M. Kapfhammer
AIRWEB
2007
Springer
14 years 1 months ago
Measuring Similarity to Detect Qualified Links
The early success of link-based ranking algorithms was predicated on the assumption that links imply merit of the target pages. However, today many links exist for purposes other ...
Xiaoguang Qi, Lan Nie, Brian D. Davison
WSC
2001
13 years 10 months ago
Ford's power train operations: changing the simulation environment
This paper discusses the changes that were required to Ford's Power Train Operations (PTO) simulation environment to ensure the maximum benefit was gained from the investment...
John Ladbrook, Annette Januszczak