Sciweavers

1824 search results - page 225 / 365
» Practices and Techniques for Engineering Process Capability ...
Sort
View
154
Voted
ADHOC
2007
159views more  ADHOC 2007»
15 years 3 months ago
Cross-layer adaptive control for wireless mesh networks
Abstract— This paper investigates optimal routing and adaptive scheduling in a wireless mesh network composed of mesh clients and mesh routers. The mesh clients are power constra...
Michael J. Neely, Rahul Urgaonkar
124
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 3 months ago
Reducing Tile Complexity for Self-Assembly Through Temperature Programming
We consider the tile self-assembly model and how tile complexity can be eliminated by permitting the temperature of the self-assembly system to be adjusted throughout the assembly...
Ming-Yang Kao, Robert T. Schweller
PPOPP
2010
ACM
16 years 1 months ago
GAMBIT: effective unit testing for concurrency libraries
As concurrent programming becomes prevalent, software providers are investing in concurrency libraries to improve programmer productivity. Concurrency libraries improve productivi...
Katherine E. Coons, Sebastian Burckhardt, Madanlal...
125
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
ICST
2009
IEEE
15 years 10 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams