Sciweavers

3147 search results - page 620 / 630
» Statistically Hiding Sets
Sort
View
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
INFSOF
2010
100views more  INFSOF 2010»
13 years 6 months ago
Investigating the impact of a measurement program on software quality
Context: Measurement programs have been around for several decades but have been often misused or misunderstood by managers and developers. This misunderstanding prevented their a...
Houari A. Sahraoui, Lionel C. Briand, Yann-Gaë...
PAMI
2010
161views more  PAMI 2010»
13 years 6 months ago
Nonstationary Shape Activities: Dynamic Models for Landmark Shape Change and Applications
—The goal of this work is to develop statistical models for the shape change of a configuration of “landmark” points (key points of interest) over time and to use these mode...
Samarjit Das, Namrata Vaswani
PVLDB
2010
117views more  PVLDB 2010»
13 years 6 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...
TON
2010
300views more  TON 2010»
13 years 5 months ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...