Sciweavers

5109 search results - page 18 / 1022
» On Learning Limiting Programs
Sort
View
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
14 years 11 months ago
Query Planning with Limited Source Capabilities
In information-integration systems, sources may have diverse and limited query capabilities. In this paper we show that because sources have restrictions on retrieving their infor...
Chen Li, Edward Y. Chang
SIGCSE
1999
ACM
98views Education» more  SIGCSE 1999»
14 years 2 months ago
Teaching Web development with limited resources
Computer Science programs are faced with demand from both students and employers for courses in hot topics such as Internet Administration, but resources such as course time and l...
Ellen Lowenfeld Walker, Logan Browne
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 9 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
CEC
2010
IEEE
13 years 1 months ago
Tweaking a tower of blocks leads to a TMBL: Pursuing long term fitness growth in program evolution
— If a population of programs evolved not for a few hundred generations but for a few hundred thousand or more, could it generate more interesting behaviours and tackle more comp...
Tony E. Lewis, George D. Magoulas
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
14 years 4 months ago
Experiences of Using Pair Programming in an Agile Project
The interest in pair programming (PP) has increased recently, e.g. by the popularization of agile software development. However, many practicalities of PP are poorly understood. W...
Jari Vanhanen, Harri Korpi