Sciweavers

2200 search results - page 66 / 440
» Programming norm change
Sort
View
SIGCSE
2002
ACM
207views Education» more  SIGCSE 2002»
13 years 9 months ago
Exploration of process interaction in operating systems: a pipe-fork simulator
Abstract This paper examines the use of a simulator to explore process interaction in Unix. The simulator allows instructors to trace through a variety of programs and to show how ...
Steven Robbins
AOSD
2011
ACM
13 years 4 months ago
Reducing combinatorics in testing product lines
A Software Product Line (SPL) is a family of programs where each program is defined by a unique combination of features. Testing or checking properties of an SPL is hard as it ma...
Chang Hwan Peter Kim, Don S. Batory, Sarfraz Khurs...
JAIR
2010
181views more  JAIR 2010»
13 years 4 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
COMBINATORICA
2011
12 years 9 months ago
On the chromatic number of random geometric graphs
Given independent random points X1, . . . , Xn ∈ Rd with common probability distribution ν, and a positive distance r = r(n) > 0, we construct a random geometric graph Gn wi...
Colin McDiarmid, Tobias Müller
CVPR
2012
IEEE
11 years 11 months ago
Robust late fusion with rank minimization
In this paper, we propose a rank minimization method to fuse the predicted confidence scores of multiple models, each of which is obtained based on a certain kind of feature. Spe...
Guangnan Ye, Dong Liu, I-Hong Jhuo, Shih-Fu Chang