Sciweavers

408 search results - page 11 / 82
» Network laws
Sort
View
ESEM
2010
ACM
13 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
TSMC
1998
135views more  TSMC 1998»
13 years 9 months ago
Universal stabilization using control Lyapunov functions, adaptive derivative feedback, and neural network approximators
— In this paper, the problem of stabilization of unknown nonlinear dynamical systems is considered. An adaptive feedback law is constructed that is based on the switching adaptiv...
Elias B. Kosmatopoulos
TOSEM
2008
117views more  TOSEM 2008»
13 years 9 months ago
Power laws in software
e than previously established, appearing at various levels of abstraction, in diverse systems and languages. The implications of this phenomenon cover various aspects of software e...
Panagiotis Louridas, Diomidis Spinellis, Vasileios...
CCS
2009
ACM
14 years 4 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
KDD
2005
ACM
140views Data Mining» more  KDD 2005»
14 years 10 months ago
Graphs over time: densification laws, shrinking diameters and possible explanations
How do real graphs evolve over time? What are "normal" growth patterns in social, technological, and information networks? Many studies have discovered patterns in stati...
Jure Leskovec, Jon M. Kleinberg, Christos Faloutso...