Sciweavers

1821 search results - page 339 / 365
» Security-Aware Program Transformations
Sort
View
CSMR
2010
IEEE
13 years 3 months ago
Automating Coverage Metrics for Dynamic Web Applications
Abstract--Building comprehensive test suites for web applications poses new challenges in software testing. Coverage criteria used for traditional systems to assess the quality of ...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
TSP
2011
142views more  TSP 2011»
13 years 3 months ago
Fractional QCQP With Applications in ML Steering Direction Estimation for Radar Detection
—This paper deals with the problem of estimating the steering direction of a signal, embedded in Gaussian disturbance, under a general quadratic inequality constraint, representi...
Antonio De Maio, Yongwei Huang, Daniel Pére...
JMLR
2010
102views more  JMLR 2010»
13 years 3 months ago
Efficient Algorithms for Conditional Independence Inference
The topic of the paper is computer testing of (probabilistic) conditional independence (CI) implications by an algebraic method of structural imsets. The basic idea is to transfor...
Remco R. Bouckaert, Raymond Hemmecke, Silvia Lindn...
ICASSP
2011
IEEE
13 years 16 days ago
One sentence voice adaptation using GMM-based frequency-warping and shift with a sub-band basis spectrum model
This paper presents a rapid voice adaptation algorithm using GMM-based frequency warping and shift with parameters of a subband basis spectrum model (SBM)[1]. The SBM parameter re...
Masatsune Tamura, Masahiro Morita, Takehiko Kagosh...
SIGSOFT
2007
ACM
14 years 9 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek