Sciweavers

1288 search results - page 133 / 258
» Understanding the Hidden Web
Sort
View
IWPSE
2007
IEEE
14 years 3 months ago
Improving defect prediction using temporal features and non linear models
Predicting the defects in the next release of a large software system is a very valuable asset for the project manger to plan her resources. In this paper we argue that temporal f...
Abraham Bernstein, Jayalath Ekanayake, Martin Pinz...
ICCS
2007
Springer
14 years 3 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
IH
1998
Springer
14 years 1 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
INFOCOM
2011
IEEE
13 years 16 days ago
Experimental evaluation of optimal CSMA
Abstract—By ‘optimal CSMA’ we denote a promising approach to maximize throughput-based utility in wireless networks without message passing or synchronization among nodes. De...
Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi...
SIGSOFT
2005
ACM
14 years 9 months ago
A case study on value-based requirements tracing
Project managers aim at keeping track of interdependencies between various artifacts of the software development lifecycle, to find out potential requirements conflicts, to better...
Matthias Heindl, Stefan Biffl