Sciweavers

2079 search results - page 331 / 416
» Quantifying Information Flow
Sort
View
SIGSOFT
2004
ACM
14 years 10 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
ISBI
2006
IEEE
14 years 10 months ago
A diffusion tensor imaging tractography algorithm based on Navier-Stokes fluid mechanics
We introduce a method for estimating regional connectivity in diffusion tensor magnetic resonance imaging (DT-MRI) based on a fluid mechanics model. We customize the Navier-Stokes...
Nathan S. Hageman, David W. Shattuck, Katherine Na...
CHI
2001
ACM
14 years 10 months ago
Layered participatory analysis: new developments in the CARD technique
CARD (Collaborative Analysis of Requirements and Design) is an influential technique for participatory design and participatory analysis that is in use on three continents. This p...
Michael J. Muller
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 4 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
WECWIS
2006
IEEE
151views ECommerce» more  WECWIS 2006»
14 years 4 months ago
Registering UMM Business Collaboration Models in an ebXML Registry
UN/CEFACT’s modeling methodology (UMM) is used to develop global choreographies of inter-organizational business processes. UMM models should be publically available in order to...
Birgit Hofreiter, Christian Huemer, Marco Zapletal