Sciweavers

2342 search results - page 424 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
EUROSYS
2008
ACM
14 years 6 months ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
EUROSYS
2006
ACM
14 years 6 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
RE
2010
Springer
13 years 3 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
BMCBI
2007
105views more  BMCBI 2007»
13 years 9 months ago
Text-derived concept profiles support assessment of DNA microarray data for acute myeloid leukemia and for androgen receptor sti
Background: High-throughput experiments, such as with DNA microarrays, typically result in hundreds of genes potentially relevant to the process under study, rendering the interpr...
Rob Jelier, Guido Jenster, Lambert C. J. Dorssers,...
JMIV
2006
176views more  JMIV 2006»
13 years 9 months ago
Segmentation of Vectorial Image Features Using Shape Gradients and Information Measures
In this paper, we propose to focus on the segmentation of vectorial features (e.g. vector fields or color intensity) using region-based active contours. We search for a domain that...
Ariane Herbulot, Stéphanie Jehan-Besson, St...