Sciweavers

11051 search results - page 2121 / 2211
» An Investigation of Generalized Cases
Sort
View
ESEM
2007
ACM
14 years 1 months ago
Value-Based Empirical Research Plan Evaluation
Empirical studies are crucial to gain evidence on the effects of software engineering methods and tools in defined contexts. However, empirical studies can be costly and thus need...
Stefan Biffl, Dietmar Winkler
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 1 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 1 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
EPIA
2009
Springer
14 years 1 months ago
Obstacle Detection, Identification and Sharing on a Robotic Soccer Team
When building a representation of the environment for a robot in a multi-agent application, as is the case of robotic soccer, sensor and information fusion of several elements of t...
João Silva, Nuno Lau, António J. R. ...
GLVLSI
2007
IEEE
194views VLSI» more  GLVLSI 2007»
14 years 1 months ago
Probabilistic maximum error modeling for unreliable logic circuits
Reliability modeling and evaluation is expected to be one of the major issues in emerging nano-devices and beyond 22nm CMOS. Such devices would have inherent propensity for gate f...
Karthikeyan Lingasubramanian, Sanjukta Bhanja
« Prev « First page 2121 / 2211 Last » Next »