Sciweavers

5766 search results - page 1057 / 1154
» Reverse Engineering of Data
Sort
View
TDSC
2010
146views more  TDSC 2010»
14 years 10 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
TMC
2010
137views more  TMC 2010»
14 years 10 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
TSE
2010
155views more  TSE 2010»
14 years 10 months ago
Incremental Test Generation for Software Product Lines
Recent advances in mechanical techniques for systematic testing have increased our ability to automatically find subtle bugs, and hence to deploy more dependable software. This pap...
Engin Uzuncaova, Sarfraz Khurshid, Don S. Batory
VLSISP
2010
191views more  VLSISP 2010»
14 years 10 months ago
Sign Language Phoneme Transcription with Rule-based Hand Trajectory Segmentation
A common approach to extract phonemes of sign language is to use an unsupervised clustering algorithm to group the sign segments. However, simple clustering algorithms based on dis...
W. W. Kong, Surendra Ranganath
160
Voted
CCGRID
2010
IEEE
14 years 7 months ago
WORKEM: Representing and Emulating Distributed Scientific Workflow Execution State
- Scientific workflows have become an integral part of cyberinfrastructure as their computational complexity and data sizes have grown. However, the complexity of the distributed i...
Lavanya Ramakrishnan, Dennis Gannon, Beth Plale
« Prev « First page 1057 / 1154 Last » Next »