Sciweavers

6941 search results - page 1335 / 1389
» Testing as a Certification Approach
Sort
View
DICS
2006
13 years 9 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
CP
2008
Springer
13 years 9 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
IMC
2007
ACM
13 years 9 months ago
Acyclic type-of-relationship problems on the internet: an experimental analysis
An experimental study of the feasibility and accuracy of the acyclicity approach introduced in [14] for the inference of business relationships among autonomous systems (ASes) is ...
Benjamin Hummel, Sven Kosub
DGO
2007
174views Education» more  DGO 2007»
13 years 9 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
DGO
2008
170views Education» more  DGO 2008»
13 years 9 months ago
Natural language processing and e-Government: crime information extraction from heterogeneous data sources
Much information that could help solve and prevent crimes is never gathered because the reporting methods available to citizens and law enforcement personnel are not optimal. Dete...
Chih Hao Ku, Alicia Iriberri, Gondy Leroy
« Prev « First page 1335 / 1389 Last » Next »