Sciweavers

653 search results - page 61 / 131
» Using common random numbers for indifference-zone selection
Sort
View
AMOST
2005
ACM
14 years 1 months ago
Modeling requirements for combinatorial software testing
The combinatorial approach to software testing uses models to generate a minimal number of test inputs so that selected combinations of input values are covered. The most common c...
Christopher M. Lott, Ashish Jain, Siddhartha R. Da...
TIT
2002
102views more  TIT 2002»
13 years 7 months ago
Asymptotic efficiency of two-stage disjunctive testing
Abstract--We adapt methods originally developed in information and coding theory to solve some testing problems. The efficiency of two-stage pool testing of items is characterized ...
Toby Berger, Vladimir I. Levenshtein
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
13 years 9 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
ICIP
1999
IEEE
14 years 9 months ago
Hyperparameter Estimation for Emission Computed Tomography Data
Over the last years many statistical models have been proposed to restore tomographical images. However, their use in medical environment has been limited due to several factors. ...
Aggelos K. Katsaggelos, Antonio López, Rafa...
CHI
2010
ACM
14 years 2 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon