Sciweavers

742 search results - page 85 / 149
» Considerations in Automated Marking
Sort
View
GECCO
2009
Springer
14 years 2 months ago
Search based data sensitivity analysis applied to requirement engineering
Software engineering is plagued by problems associated with unreliable cost estimates. This paper introduces an approach to sensitivity analysis for requirements engineering. It u...
Mark Harman, Jens Krinke, Jian Ren, Shin Yoo
CLEF
2000
Springer
14 years 2 months ago
Sheffield University CLEF 2000 Submission - Bilingual Track: German to English
We investigated dictionary based cross language information retrieval using lexical triangulation. Lexical triangulation combines the results of different transitive translations. ...
Tim Gollins, Mark Sanderson
AC
1999
Springer
14 years 2 months ago
Integrating Group Communication with Transactions for Implementing Persistent Replicated Objects
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Mark C. Little, Santosh K. Shrivastava
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
14 years 2 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
GROUP
2007
ACM
14 years 2 months ago
Knowledge work artifacts: kernel cousins for free/open source software development
Most empirical studies of peer production have focused on the final products of these efforts (such as software in Free/Open Source projects), but there are also many other knowle...
Margaret S. Elliott, Mark S. Ackerman, Walt Scacch...