Sciweavers

3819 search results - page 703 / 764
» Predicting Dependability by Testing
Sort
View
KBSE
2007
IEEE
14 years 3 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
GRID
2007
Springer
14 years 3 months ago
Eliciting honest value information in a batch-queue environment
Abstract— Markets and auctions have been proposed as mechanisms for efficiently and fairly allocating resources in a number of different computational settings. Economic approac...
Andrew Mutz, Richard Wolski, John Brevik
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 3 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
SMI
2006
IEEE
123views Image Analysis» more  SMI 2006»
14 years 3 months ago
Selecting Distinctive 3D Shape Descriptors for Similarity Retrieval
Databases of 3D shapes have become widespread for a variety of applications, and a key research problem is searching these databases for similar shapes. This paper introduces a me...
Philip Shilane, Thomas A. Funkhouser
MM
2006
ACM
143views Multimedia» more  MM 2006»
14 years 3 months ago
Motion swarms: video interaction for art in complex environments
We create interactive art that can be enjoyed by groups such as audiences at public events with the intent to encourage communication with those around us as we play with the art....
Quoc Nguyen, Scott Novakowski, Jeffrey E. Boyd, Ch...