Sciweavers

1225 search results - page 41 / 245
» Performance Evaluation of Grid-Enabled Code: A Case Study
Sort
View
IJON
2002
99views more  IJON 2002»
13 years 7 months ago
Asymptotic behaviors of population codes
The present study investigates asymptotic behaviors of population codes, i.e., their performances when the number of neurons goes to in
Si Wu, Shun-ichi Amari, Hiroyuki Nakahara
WCRE
2010
IEEE
13 years 6 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...
ICC
2009
IEEE
165views Communications» more  ICC 2009»
13 years 5 months ago
Coding-Aware Scheduling for Reliable Many-to-One Flows
We revisit the problem of scheduling the sources transmissions in a many-to-one flow to provide reliable communication between n sources and a single destination. The performance o...
Osameh M. Al-Kofahi, Ahmed E. Kamal
SIGDOC
1997
ACM
13 years 12 months ago
Usability Studies of WWW Sites: Heuristic Evaluation vs. Laboratory Testing
This paper describes the strengths and weaknesses of two usability assessment methods frequently applied to web sites. It uses case histories of WWW usability studies conducted by...
Laurie Kantner, Stephanie Rosenbaum
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
13 years 11 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis