Sciweavers

408 search results - page 45 / 82
» One evaluation of model-based testing and its automation
Sort
View
ICSM
2003
IEEE
14 years 2 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
GEOINFORMATICA
2002
136views more  GEOINFORMATICA 2002»
13 years 8 months ago
Tabu Search Heuristic for Point-Feature Cartographic Label Placement
The generation of better label placement configurations in maps is a problem that comes up in automated cartographic production. The objective of a good label placement is to displ...
Missae Yamamoto, Gilberto Câmara, Luiz Anton...
ICASSP
2007
IEEE
14 years 3 months ago
Analysis of Musical Instrument Sounds by Source-Filter-Decay Model
This paper proposes a way of modelling the time-varying spectral energy distribution of musical instrument sounds. The model consists of an excitation signal, a body response fil...
Anssi Klapuri
ADAEUROPE
2004
Springer
14 years 2 months ago
Implementing an Application-Defined Scheduling Framework for Ada Tasking
Abstract: A framework for application-defined scheduling and its corresponding application program interface (API) were defined during the last International Real-Time Ada Workshop...
Mario Aldea Rivas, Francisco Javier Miranda Gonz&a...
DELOS
2007
13 years 10 months ago
MESSIF: Metric Similarity Search Implementation Framework
The similarity search has become a fundamental computational task in many applications. One of the mathematical models of the similarity – the metric space – has drawn attenti...
Michal Batko, David Novak, Pavel Zezula