Sciweavers

2082 search results - page 366 / 417
» Change Paths in Reasoning!
Sort
View
ESEM
2010
ACM
13 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
AIEDAM
2011
13 years 5 months ago
Discovering implicit constraints in design
In familiar design domains, expert designers are able to quickly focus on “good designs”, based on constraints they have learned while exploring the design space. This ability ...
Madan Mohan Dabbeeru, Amitabha Mukerjee
PAMI
2011
13 years 4 months ago
Robust Stereo Matching Using Adaptive Normalized Cross-Correlation
—A majority of the existing stereo matching algorithms assume that the corresponding color values are similar to each other. However, it is not so in practice as image color valu...
Yong Seok Heo, Kyoung Mu Lee, Sang Uk Lee
MANSCI
2011
13 years 25 days ago
Dynamic Price Competition with Fixed Capacities
Many revenue management (RM) industries are characterized by (a) fixed capacities in the short term (e.g., hotel rooms, seats on an airline flight), (b) homogeneous products (e....
Victor Martínez-de-Albéniz, Kalyan T...
ISSTA
2012
ACM
12 years 12 days ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...