Sciweavers

670 search results - page 77 / 134
» An Immunological Approach to Change Detection: Theoretical R...
Sort
View
KBSE
2005
IEEE
14 years 1 months ago
Automated replay and failure detection for web applications
User-session-based testing of web applications gathers user sessions to create and continually update test suites based on real user input in the field. To support this approach ...
Sara Sprenkle, Emily Gibson, Sreedevi Sampath, Lor...
CLA
2006
13 years 9 months ago
Using FCA to Suggest Refactorings to Correct Design Defects
Abstract. Design defects are poor design choices resulting in a hard-tomaintain software, hence their detection and correction are key steps of a disciplined software process aimed...
Naouel Moha, Jihene Rezgui, Yann-Gaël Gu&eacu...
DSN
2008
IEEE
14 years 2 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
BMCBI
2008
179views more  BMCBI 2008»
13 years 8 months ago
Improving the power for detecting overlapping genes from multiple DNA microarray-derived gene lists
Background: In DNA microarray gene expression profiling studies, a fundamental task is to extract statistically significant genes that meet certain research hypothesis. Currently,...
Xutao Deng, Jun Xu, Charles Wang
ICPR
2010
IEEE
13 years 6 months ago
Scene-Adaptive Human Detection with Incremental Active Learning
In many computer vision tasks, scene changes hinder the generalization ability of trained classifiers. For instance, a human detector trained with one set of images is unlikely t...
Ajay Joshi, Fatih Porikli