Sciweavers

1664 search results - page 67 / 333
» Testing in the Component Age
Sort
View
AIRWEB
2009
Springer
14 years 4 months ago
Tag spam creates large non-giant connected components
Spammers in social bookmarking systems try to mimick bookmarking behaviour of real users to gain the attention of other users or search engines. Several methods have been proposed...
Nicolas Neubauer, Robert Wetzker, Klaus Obermayer
VIS
2007
IEEE
157views Visualization» more  VIS 2007»
14 years 11 months ago
Surface Extraction from Multi-Material Components for Metrology using Dual Energy CT
Abstract-- This paper describes a novel method for creating surface models of multi-material components using dual energy computed tomography (DECT). The application scenario is me...
Christoph Heinzl, Johann Kastner, Eduard Grölle...
ICST
2009
IEEE
14 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
BMCBI
2010
133views more  BMCBI 2010»
13 years 9 months ago
New components of the Dictyostelium PKA pathway revealed by Bayesian analysis of expression data
Background: Identifying candidate genes in genetic networks is important for understanding regulation and biological function. Large gene expression datasets contain relevant info...
Anup Parikh, Eryong Huang, Christopher Dinh, Blaz ...
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 9 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...