Identification

Results: 56210



#Item
1Software development / Computing / Debugging / Aspect-oriented software development / Aspect-oriented programming / Delta debugging / Extreme programming / Software testing / Debugger / Software bug / AspectJ / Spring Framework

Effective Identification of Failure-Inducing Changes: A Hybrid Approach∗ Sai Zhang, Yu Lin, Zhongxian Gu, Jianjun Zhao School of Software Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
2Debugging / Delta debugging / Complement system

Effective Identification of Failure-Inducing Changes: A Hybrid Approach Sai Zhang, Yu Lin, Zhongxian Gu, Jianjun Zhao PASTE 2008

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:35
3Information science / Yahoo! Answers / Information retrieval / Question answering / Answer / Internet forum / Questions and answers / Artificial intelligence

Structural Normalisation Methods for Improving Best Answer Identification in Question Answering Communities Grégoire Burel, Paul Mulholland and Harith Alani Knowledge Media Institute, Open University, UK {g.burel, p.mu

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:49:36
4Climate modeling / Physical oceanography / Community Earth System Model / Application software / Software quality / MX

National Center for Atmospheric Research Quality Assurance and Error Identification for the Community Earth System Model Allison Baker

Add to Reading List

Source URL: correctness-workshop.github.io

Language: English - Date: 2017-11-14 22:52:13
5Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
6Computational neuroscience / Cognition / Cognitive science / AOA / Applied mathematics / Artificial neural network / Connectionism / ACT-R

Age of Acquisition in Facial Identification: A Connectionist Approach Brenden M. Lake () Torrey Pines High School, 710 Encinitas Blvd. Encinitas, CAUSA Garrison W. Cottrell ()

Add to Reading List

Source URL: cims.nyu.edu

Language: English - Date: 2010-05-26 18:03:37
7Economy / Social inequality / Economic inequality / Distribution of wealth / Income inequality metrics / Economic inequality in the United States / Welfare economics / Gini coefficient / Inequality / Social mobility / Income inequality in the United States

Class Identification in Modern Democracies: A Comparative Study of its Sources and Effects by Josh P. Curtis

Add to Reading List

Source URL: tspace.library.utoronto.ca

Language: English - Date: 2015-06-17 17:25:10
8Elections / Politics / Government / Group decision-making / Provisional ballot / Electronic voting / Voter registration / Suffrage / Voting

VOTING RIGHTS INFORMATION Voters’ Rights 1. Voters whose names do not appear on the poll list in an election, or who are unable to comply with identification requirements, are entitled to vote by provisional ballot if

Add to Reading List

Source URL: www.sos.state.oh.us

Language: English - Date: 2017-05-16 11:43:45
9Radio-frequency identification / Automatic identification and data capture / Privacy / Ubiquitous computing / Wireless / Mobile RFID / SAM / Computing / Technology / Data

A Parallel Identification Protocol for RFID Systems Linghe Kong∗† , Liang He∗ , Yu Gu∗ , Min-You Wu† , Tian He‡ ∗ Singapore University of Technology and Design, Singapore † Shanghai Jiao Tong University,

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:36
10Digital marketing / World Wide Web / Humancomputer interaction / Computing / Marketing / Big data / Business intelligence / Session / GroupLens Research / Web analytics / Recommender system / Activity theory

User Session Identification Based on Strong Regularities in Inter-activity Time Aaron Halfaker1 Oliver Keyes1 Daniel Kluver2 Jacob Thebault-Spieker2 Tien Nguyen2 Kenneth Shores2 Anuradha Uduwage2 Morten Warncke-Wang2 1

Add to Reading List

Source URL: www.www2015.it

Language: English - Date: 2015-05-15 11:19:06
UPDATE