Sciweavers

483 search results - page 76 / 97
» Experimental Software Engineering: A Report on the State of ...
Sort
View
ICSM
2009
IEEE
13 years 6 months ago
Effective and efficient localization of multiple faults using value replacement
We previously presented a fault localization technique called Value Replacement that repeatedly alters the state of an executing program to locate a faulty statement [9]. The tech...
Dennis Jeffrey, Neelam Gupta, Rajiv Gupta
IUI
2005
ACM
14 years 2 months ago
Automated email activity management: an unsupervised learning approach
Many structured activities are managed by email. For instance, a consumer purchasing an item from an e-commerce vendor may receive a message confirming the order, a warning of a ...
Nicholas Kushmerick, Tessa A. Lau
IMC
2006
ACM
14 years 2 months ago
The need for cross-layer information in access point selection algorithms
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
Karthikeyan Sundaresan, Konstantina Papagiannaki
TC
2010
13 years 3 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
JCDL
2005
ACM
111views Education» more  JCDL 2005»
14 years 2 months ago
Digitization and 3D modeling of movable books
Movable books provide interesting challenges for digitization and user interfaces design. We report in this paper some preliminary results in the building of a 3D visualization wo...
Pierre Cubaud, Jérôme Dupire, Alexand...