Sciweavers

156 search results - page 24 / 32
» What are Cycle-Stealing Systems Good For
Sort
View
ITICSE
2009
ACM
14 years 1 months ago
Software reuse and plagiarism: a code of practice
In general, university guidelines or policies on plagiarism are not sufficiently detailed to cope with the technical complexity of software. Software plagiarism can have a signiï¬...
J. Paul Gibson
DATE
2004
IEEE
97views Hardware» more  DATE 2004»
13 years 11 months ago
A Formal Verification Methodology for Checking Data Integrity
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verificati...
Yasushi Umezawa, Takeshi Shimizu
20
Voted
DAIS
2006
13 years 8 months ago
On the Value of Random Opinions in Decentralized Recommendation
Abstract. As the amount of information available to users continues to grow, filtering wanted items from unwanted ones becomes a dominant task. To this end, various collaborative-f...
Elth Ogston, Arno Bakker, Maarten van Steen
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 7 months ago
Detecting Coordination Problems in Collaborative Software Development Environments
Software development is rarely an individual effort and generally involves teams of developers collaborating to generate good reliable code. Among the software code there exist te...
Chintan Amrit, Jos van Hillegersberg
CSL
2006
Springer
13 years 7 months ago
Application-independent evaluation of speaker detection
We propose and motivate an alternative to the traditional error-based or cost-based evaluation metrics for the goodness of speaker detection performance. The metric that we propos...
Niko Brümmer, Johan A. du Preez