Sciweavers

7117 search results - page 1343 / 1424
» IT Governance Frameworks as Methods
Sort
View
ICML
2007
IEEE
16 years 5 months ago
Boosting for transfer learning
Traditional machine learning makes a basic assumption: the training and test data should be under the same distribution. However, in many cases, this identicaldistribution assumpt...
Wenyuan Dai, Qiang Yang, Gui-Rong Xue, Yong Yu
104
Voted
ICML
2006
IEEE
16 years 5 months ago
Categorization in multiple category systems
We explore the situation in which documents have to be categorized into more than one category system, a situation we refer to as multiple-view categorization. More particularly, ...
Éric Gaussier, Cyril Goutte, Françoi...
SIGSOFT
2007
ACM
16 years 5 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
SIGSOFT
2007
ACM
16 years 5 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
SIGSOFT
2004
ACM
16 years 5 months ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
« Prev « First page 1343 / 1424 Last » Next »