Sciweavers

269 search results - page 43 / 54
» kais 2008
Sort
View
ICSE
2008
IEEE-ACM
14 years 10 months ago
Best practices in extreme programming course design
Teaching (and therefore learning) eXtreme Programming (XP) in a university setting is difficult because of course time limitations and the soft nature of XP that requires first-ha...
Kai Stapel, Daniel Lübke, Eric Knauss
ICDM
2008
IEEE
146views Data Mining» more  ICDM 2008»
14 years 4 months ago
Isolation Forest
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify instances that do not conform to the normal profile as anomalies...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
USENIX
2008
14 years 4 days ago
A Dollar from 15 Cents: Cross-Platform Management for Internet Services
As Internet services become ubiquitous, the selection and management of diverse server platforms now affects the bottom line of almost every firm in every industry. Ideally, such ...
Christopher Stewart, Terence Kelly, Alex Zhang, Ka...
APPROX
2008
Springer
71views Algorithms» more  APPROX 2008»
13 years 12 months ago
Tight Bounds for Hashing Block Sources
It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
Kai-Min Chung, Salil P. Vadhan
ESEM
2008
ACM
13 years 11 months ago
A survey on software cost estimation in the chinese software industry
Although a lot of attention has been paid to software cost estimation since 1960, making accurate effort and schedule estimation is still a challenge. To collect evidence and iden...
Da Yang, Qing Wang, Mingshu Li, Ye Yang, Kai Ye, J...