Sciweavers

350 search results - page 42 / 70
» Predictability in Real-time System Development (2) A Case St...
Sort
View
TSE
2008
92views more  TSE 2008»
13 years 7 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
13 years 11 months ago
Online discovery and maintenance of time series motifs
The detection of repeated subsequences, time series motifs, is a problem which has been shown to have great utility for several higher-level data mining algorithms, including clas...
Abdullah Mueen, Eamonn J. Keogh
CCS
2003
ACM
14 years 28 days ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
GIS
2010
ACM
13 years 6 months ago
Spatial data infrastructures as complex adaptive systems
Many researchers throughout the world have been struggling to better understand and describe Spatial Data Infrastructures (SDIs). Our knowledge of the real forces and mechanisms b...
L. Grus, Joep Crompvoets, A. K. Bregt
ACJ
2002
84views more  ACJ 2002»
13 years 7 months ago
Who needs a 'Killer App'? Two Perspectives on Content in Residential Broadband Networks
This paper describes the deployment of residential broadband networks by relating two parallel but contrasting stories. Story 1 considers network providers' search for a kill...
Catherine A. Middleton