There is a general agreement among software engineering practitioners that software inspections are an important technique to achieve high software quality at a reasonable cost. H...
Lionel C. Briand, Bernd G. Freimut, Ferdinand Voll...
Random Noise and Random Walk algorithms are local search strategies that have been used for the problem of satisfiability testing (SAT). We present a Markov-chain based analysis o...
Bhaskar Krishnamachari, Xi Xie, Bart Selman, Steph...
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
This paper presents a scheme by which a manipulator can use dynamic tactile sensing to detect when it is about to lose hold of a grasped object and take preventive measures before...
In microarray gene expression data, clusters may hide in subspaces. Traditional clustering algorithms that make use of similarity measurements in the full input space may fail to ...
Kevin Y. Yip, David W. Cheung, Michael K. Ng, Kei-...