Sciweavers

315 search results - page 23 / 63
» Claims Analysis
Sort
View
ISSRE
2005
IEEE
15 years 9 months ago
Prioritize Code for Testing to Improve Code Coverage of Complex Software
Code prioritization for testing promises to achieve the maximum testing coverage with the least cost. This paper presents an innovative method to provide hints on which part of co...
J. Jenny Li
161
Voted
TACS
1994
Springer
15 years 7 months ago
Separate Abstract Interpretation for Control-Flow Analysis
Abstract Interpretation for Control-Flow Analysis Yan Mei Tang and Pierre Jouvelot CRI, Ecole des Mines de Paris, France Effect systems and abstract interpretation are two methods ...
Yan Mei Tang, Pierre Jouvelot
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
15 years 10 months ago
An Activity-Based Approach towards Development and Use of E-Government Service Ontologies
In order to assist bottom-up efforts by administrations annotating their Web resources with adequate metadata, we introduce and follow an activity-based approach towards developme...
Ralf Klischewski, Stefan Ukena
EUROSSC
2007
Springer
15 years 10 months ago
Sensing Motion Using Spectral and Spatial Analysis of WLAN RSSI
In this paper we present how motion sensing can be obtained just by observing the WLAN radio signal strength and its fluctuations. The temporal, spectral and spatial characteristi...
Kavitha Muthukrishnan, Maria Eva Lijding, Nirvana ...
123
Voted
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 9 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen