Sciweavers

1033 search results - page 170 / 207
» Properties of Exercise Strategies
Sort
View
SIGSOFT
2010
ACM
15 years 1 months ago
Rethinking the economics of software engineering
Reliance on skilled developers reduces the return on investment for important software engineering tasks such as establishing program correctness. This position paper introduces a...
Todd W. Schiller, Michael D. Ernst
ANOR
2010
130views more  ANOR 2010»
15 years 1 months ago
Greedy scheduling with custom-made objectives
We present a methodology to automatically generate an online job scheduling method for a custom-made objective and real workloads. The scheduling problem comprises independent para...
Carsten Franke, Joachim Lepping, Uwe Schwiegelshoh...
CORR
2010
Springer
132views Education» more  CORR 2010»
15 years 1 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
TROB
2011
255views more  TROB 2011»
14 years 11 months ago
Active 3D Object Localization Using a Humanoid Robot
—We study the problem of actively searching for an object in a 3D environment under the constraint of a maximum search time, using a visually guided humanoid robot with twentysix...
Alexander Andreopoulos, Stephan Hasler, Heiko Wers...
EJWCN
2010
122views more  EJWCN 2010»
14 years 11 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...