Sciweavers

81 search results - page 13 / 17
» Bad Pairs in Software Testing
Sort
View
RTAS
2005
IEEE
14 years 29 days ago
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks
— Denial-of-service attacks are becoming more frequent and sophisticated. Researchers have proposed a variety of defenses, including better system configurations, infrastructure...
V. Krishna Nandivada, Jens Palsberg
BIOINFORMATICS
2007
190views more  BIOINFORMATICS 2007»
13 years 7 months ago
Towards clustering of incomplete microarray data without the use of imputation
Motivation: Clustering technique is used to find groups of genes that show similar expression patterns under multiple experimental conditions. Nonetheless, the results obtained by...
Dae-Won Kim, Ki Young Lee, Kwang H. Lee, Doheon Le...
BMCBI
2008
148views more  BMCBI 2008»
13 years 7 months ago
StAR: a simple tool for the statistical comparison of ROC curves
Background: As in many different areas of science and technology, most important problems in bioinformatics rely on the proper development and assessment of binary classifiers. A ...
Ismael A. Vergara, Tomás Norambuena, Evandr...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Succession: Measuring transfer of code and developer productivity
Code ownership transfer or succession is a crucial ingredient in open source code reuse and in offshoring projects. Measuring succession can help understand factors that affect ...
Audris Mockus
VL
2005
IEEE
159views Visual Languages» more  VL 2005»
14 years 29 days ago
Executable Visual Contracts
Design by Contract (DbC) is widely acknowledged to be a powerful technique for creating reliable software. DbC allows developers to specify the behavior of an operation precisely ...
Marc Lohmann, Stefan Sauer, Gregor Engels