Sciweavers

890 search results - page 131 / 178
» Comparative expert reviews
Sort
View
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
14 years 10 months ago
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects
In modern application domains such as multimedia, molecular biology and medical imaging, similarity search in database systems is becoming an increasingly important task. Especial...
Hans-Peter Kriegel, Stefan Brecheisen, Peer Kr&oum...
ICSE
2005
IEEE-ACM
14 years 10 months ago
A multiple case study on the impact of pair programming on product quality
Pair programming is a programming technique in which two programmers use one computer to work together on the same task. There is an ongoing debate over the value of pair programm...
Hanna Hulkko, Pekka Abrahamsson
ICSE
2005
IEEE-ACM
14 years 10 months ago
Validation methods for calibrating software effort models
COCONUT calibrates effort estimation models using an exhaustive search over the space of calibration parameters in a COCOMO I model. This technique is much simpler than other effo...
Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn...
SDM
2009
SIAM
204views Data Mining» more  SDM 2009»
14 years 7 months ago
Application of Bayesian Partition Models in Warranty Data Analysis.
Automotive companies are forced to continuously extend and improve their product line-up. However, increasing diversity, higher design complexity, and shorter development cycles c...
Axel Blumenstock, Christoph Schlieder, Markus M&uu...
IDTRUST
2010
ACM
14 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith