Sciweavers

1961 search results - page 14 / 393
» PicoDBMS: Validation and Experience
Sort
View
USENIX
2008
13 years 11 months ago
A Linux Implementation Validation of Track-Aligned Extents and Track-Aligned RAIDs
Through clean-slate implementation of two storage optimizations--track-aligned extents and track-aligned RAIDs--this paper shows the values of independent validations. The experie...
Jin Qian, Christopher R. Meyers, An-I Andy Wang
PADS
2004
ACM
14 years 2 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
14 years 2 months ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...
PAKDD
2000
ACM
100views Data Mining» more  PAKDD 2000»
14 years 11 days ago
Discovery of Relevant Weights by Minimizing Cross-Validation Error
In order to discover relevant weights of neural networks, this paper proposes a novel method to learn a distinct squared penalty factor for each weight as a minimization problem ov...
Kazumi Saito, Ryohei Nakano
IEEEARES
2010
IEEE
14 years 3 months ago
Investigating the Limitations of Java Annotations for Input Validation
—Recently Java annotations have received a lot of attention as a possible way to simplify the usage of various frameworks, ranging from persistence and verification to security....
Federico Mancini, Dag Hovland, Khalid A. Mughal