Sciweavers

658 search results - page 29 / 132
» Evaluation of alternative presentation control techniques
Sort
View
WER
2007
Springer
14 years 1 months ago
Test-case Driven versus Checklist-based Inspections of Software Requirements - An Experimental Evaluation
Software inspections have proved to be an effective means to find faults in different software artifacts, and the application of software inspections on requirements specification...
Nina Dzamashvili-Fogelström, Tony Gorschek
RECSYS
2010
ACM
13 years 7 months ago
Beyond accuracy: evaluating recommender systems by coverage and serendipity
When we evaluate the quality of recommender systems (RS), most approaches only focus on the predictive accuracy of these systems. Recent works suggest that beyond accuracy there i...
Mouzhi Ge, Carla Delgado-Battenfeld, Dietmar Janna...
DBSEC
2010
126views Database» more  DBSEC 2010»
13 years 9 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
UML
2005
Springer
14 years 1 months ago
Evaluating the Effect of Composite States on the Understandability of UML Statechart Diagrams
UML statechart diagrams have become an important technique for describing the dynamic behavior of a software system. They are also a significant element of OO design, especially in...
José A. Cruz-Lemus, Marcela Genero, M. Espe...
GECCO
2007
Springer
293views Optimization» more  GECCO 2007»
14 years 1 months ago
Solving the artificial ant on the Santa Fe trail problem in 20, 696 fitness evaluations
In this paper, we provide an algorithm that systematically considers all small trees in the search space of genetic programming. These small trees are used to generate useful subr...
Steffen Christensen, Franz Oppacher