Sciweavers

56 search results - page 5 / 12
» An Expert System for Microbiological Data Validation and Sur...
Sort
View
MSR
2005
ACM
14 years 1 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
GIS
2010
ACM
13 years 6 months ago
Spatial data infrastructures as complex adaptive systems
Many researchers throughout the world have been struggling to better understand and describe Spatial Data Infrastructures (SDIs). Our knowledge of the real forces and mechanisms b...
L. Grus, Joep Crompvoets, A. K. Bregt
AIED
2009
Springer
14 years 2 months ago
Using Learning Decomposition to Analyze Instructional Effectiveness in the ASSISTment System
A basic question of instruction is how effective it is in promoting student learning. This paper presents a study determining the relative efficacy of different instructional conte...
Mingyu Feng, Neil T. Heffernan, Joseph E. Beck
KBSE
2007
IEEE
14 years 1 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ECOI
2010
144views more  ECOI 2010»
13 years 6 months ago
Machine reasoning about anomalous sensor data
We describe a semantic data validation tool that is capable of observing incoming real-time sensor data and performing reasoning against a set of rules specific to the scientific d...
Matt Calder, Robert A. Morris, Francesco Peri