Search For:

Displaying 1-50 out of 217 total
Toward instant gradeification
Found in: Software Engineering Education and Training, Conference on
By Daniel M. Zimmerman,Joseph R. Kiniry,Fintan Fairmichael
Issue Date:May 2011
pp. 406-410
Providing useful feedback to students about both the functional correctness and the internal structure of their submissions is the most labor-intensive part of teaching programming courses. The former can be automated through test scripts and other similar...
 
The impact of domain knowledge on the effectiveness of requirements idea generation during requirements elicitation
Found in: 2012 IEEE 20th International Requirements Engineering Conference (RE)
By Ali Niknafs,Daniel M. Berry
Issue Date:September 2012
pp. 181-190
It is believed that the effectiveness of requirements engineering activities depends at least partially on the individuals involved. One of the factors that seems to influence an individual's effectiveness in requirements engineering activities is knowledg...
 
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Found in: Computer Security Applications Conference, Annual
By Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu
Issue Date:December 2004
pp. 82-90
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt other data structures. The standard way to exploit a buffer overflow vulnerabili...
 
A Structure Theorem for Poorly Anticoncentrated Gaussian Chaoses and Applications to the Study of Polynomial Threshold Functions
Found in: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science (FOCS)
By Daniel M. Kane
Issue Date:October 2012
pp. 91-100
We prove a structural result for degree-$d$ polynomials. In particular, we show that any degree-$d$ polynomial, $p$ can be approximated by another polynomial, $p_0$, which can be decomposed as some function of polynomials $q_1, \ldots, q_m$ with $q_i$ norm...
 
Results from Measuring the Performance of the NAS Benchmarks on the Current Generation of Parallel Computers and Observations Drawn from these Measurements
Found in: Defense Users Group Conference, Department of
By Daniel M. Pressel
Issue Date:June 2004
pp. 334-339
The NAS Division at NASA Ames Research Center has developed a highly respected and widely used set of benchmarks for parallel computers. These benchmarks are based on the needs of computational fluid dynamics applications, but appear to have relevance to o...
 
C-Focus-3: a C-Focus with a New Heuristic Search Strategy
Found in: Intelligent Systems Design and Applications, International Conference on
By Daniel M. Santoro, Maria do Carmo Nicoletti, Estevan R. Hruschka
Issue Date:October 2007
pp. 479-484
The problem of feature selection is particularly important in areas such as machine learning and data mining. Given a training set which generally is described as a set of instances, each of them represented as a vector of feature-value pairs and an associ...
 
Guest Editors' Introduction: Stochastic Modeling of Complex Systems
Found in: Computing in Science and Engineering
By Daniel M. Tartakovsky, Dongbin Xiu
Issue Date:March 2007
pp. 8-9
The guest editors for this special issue on stochastic modeling introduce the field and its current state of the art, along with the articles they've chosen to demonstrate the next steps forward.
 
To do or not to do: If the requirements engineering payoff is so good, why aren?t more companies doing it?
Found in: Requirements Engineering, IEEE International Conference on
By Daniel M. Berry, Daniela Damian, Anthony Finkelstein, Don Gause, Robert Hall, Alan Wassyng
Issue Date:September 2005
pp. 447
<p>The by an author?s name means that the author plans to be present at the panel session. RE researchers have noted time and again the difficulty of technology transfer, that of getting technology that RE research has developed and found useful to b...
   
Guest Editors' Introduction: Multiphysics Modeling
Found in: Computing in Science and Engineering
By Daniel M. Tartakovsky, Francis J. Alexander
Issue Date:May 2005
pp. 14-15
Fueled by breakthroughs in both hardware and algorithm development, the past few decades have witnessed an explosive growth in computational power, which has led to remarkable advances in various fields of science and technology, such as the mapping of the...
 
The Syntactically Dangerous All and Plural in Specifications
Found in: IEEE Software
By Daniel M. Berry, Erik Kamsties
Issue Date:January 2005
pp. 55-57
The word
 
Improving a Pittsburgh Leant Fuzzy Rule Base using Feature Subset Selection
Found in: Hybrid Intelligent Systems, International Conference on
By Pablo A. D. de Castro, Daniel M. Santoro, Heloisa A. Camargo, Maria C. Nicoletti
Issue Date:December 2004
pp. 180-185
This paper investigates the problem of feature subset selection as a pre-processing step to a method which learns fuzzy rule bases using genetic algorithm (GA) implementing the Pittsburgh approach. Four feature subset selection methods are investigated in ...
 
Spectroscopic Imaging Using Terahertz Time-Domain Signals
Found in: Image Analysis and Interpretation, IEEE Southwest Symposium on
By Timothy D. Dorney, Richard G. Baraniuk, Daniel M. Mittleman
Issue Date:April 2000
pp. 151
Imaging systems based on terahertz time-domain spectroscopy offer a range of unique modalities due to the broad bandwidth, sub-picosecond duration, and phase-sensitive detection of the THz pulses. Furthermore, an exciting possibility exists to combine spec...
 
TopicView: Visually Comparing Topic Models of Text Collections
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Patricia J. Crossno,Andrew T. Wilson,Timothy M. Shead,Daniel M. Dunlavy
Issue Date:November 2011
pp. 936-943
We present Topic View, an application for visually comparing and exploring multiple models of text corpora. Topic View uses multiple linked views to visually analyze both the conceptual content and the document relationships in models generated using diffe...
 
FPGA Implementation for Direct Kinematics of a Spherical Robot Manipulator
Found in: Reconfigurable Computing and FPGAs, International Conference on
By Diego F. Sánchez, Daniel M. Muñoz, Carlos H. Llanos, José M. Motta
Issue Date:December 2009
pp. 416-421
The sequential behavior of general purpose processors presents limitations in applications that require high processing speeds. One of the advantages of FPGAs implementations is the parallel process capability, allowing acceleration of complex algorithms. ...
 
A Model to Understand the Building and Running Inter-Dependencies of Software
Found in: Reverse Engineering, Working Conference on
By Daniel M. German, Jesús M. González-Barahona, Gregorio Robles
Issue Date:October 2007
pp. 140-149
The notion of functional or modular dependency is fun- damental to understand the architecture and inner work- ings of any software system. In this paper, we propose to extend that notion to consider dependencies at a larger scale, between software applica...
 
Secrets to Success and Fatal Flaws: The Design of Large-Display Groupware
Found in: IEEE Computer Graphics and Applications
By Elaine M. Huang, Elizabeth D. Mynatt, Daniel M. Russell, Alison E. Sue
Issue Date:January 2006
pp. 37-45
Large displays are becoming increasingly common technologies in the workplace because of their potential as information and collaboration surfaces. Despite its growing ubiquity, large display groupware often fails to be integrated into workgroup practice, ...
 
Trading Agents Competing: Performance, Progress, and Market Effectiveness
Found in: IEEE Intelligent Systems
By Michael P. Wellman, Shih-Fen Cheng, Daniel M. Reeves, Kevin M. Lochner
Issue Date:November 2003
pp. 48-53
<p>Held annually since 2000, the annual Trading Agent Competition provides a forum for designers to evaluate programmed trading techniques in a challenging market scenario. Using three years of tournament data, the authors attempt to evaluate competi...
 
IT in society: a multi-disciplinary course
Found in: Frontiers in Education, Annual
By M. Daniels, M. Petre
Issue Date:November 1999
pp. 13A1/21vol.2-13A1/20vol.2
The authors describe a course, the aim of which is to provide a multi-faceted understanding of the interactions between technology, users and designers. This involves examining each type of interaction-between users, between designer and user, between user...
 
Design and Performance Tradeoffs in Clustered Video Servers
Found in: Multimedia Computing and Systems, International Conference on
By Renu Tewari, Rajat Mukherjee, Daniel M. Dias, Harrick M. Vin
Issue Date:June 1996
pp. 0144
No summary available.
 
High Availability in Clustered Multimedia Servers
Found in: Data Engineering, International Conference on
By Renu Tewari Daniel M. Dias, Rajat Mukherjee, Harrick M. Vin
Issue Date:March 1996
pp. 645
Clustered multimedia servers, consisting of interconnected nodes and disks, have been proposed for large scale servers, that are capable of supporting multiple concurrent streams which access the video objects stored in the server. As the number of disks a...
 
The automatic inversion of attribute grammars
Found in: IEEE Transactions on Software Engineering
By Daniel M. Yellin,Eva-Maria M. Mueckstein
Issue Date:May 1986
pp. 590-599
Over the last decade there has developed an acute awareness of the need to introduce abstraction and mathematical rigor into the programming process. This increased formality allows for the automatic manipulation of software, increasing productivity, and, ...
 
Understanding Competition Using Big Consumer Search Data
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Daniel M. Ringel,Bernd Skiera
Issue Date:January 2014
pp. 3129-3138
Understanding competition is essential for every firm. Unfortunately, information on who competes with whom is scarce. Traditional research approaches such as surveys and panels are time consuming, expensive, and usually not well applicable to markets with...
   
Synergistic Clustering of Image and Segment Descriptors for Unsupervised Scene Understanding
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Daniel M. Steinberg,Oscar Pizarro,Stefan B. Williams
Issue Date:December 2013
pp. 3463-3470
With the advent of cheap, high fidelity, digital imaging systems, the quantity and rate of generation of visual data can dramatically outpace a humans ability to label or annotate it. In these situations there is scope for the use of unsupervised approache...
 
A Hardware Approach for Solving the Robot Localization Problem Using a Sequential EKF
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Sergio Cruz,Daniel M. Munoz,Milton E. Conde,Carlos H. Llanos,Geovany A. Borges
Issue Date:May 2013
pp. 306-313
This work describes a hardware architecture for implementing a sequential approach of the Extended Kalman Filter (EKF) that is suitable for mobile robotics tasks, such as self-localization, mapping and navigation problems. As such algorithm is computationa...
 
The Evolution of the R Software Ecosystem
Found in: 2013 17th European Conference on Software Maintenance and Reengineering (CSMR)
By Daniel M. German,Bram Adams,Ahmed E. Hassan
Issue Date:March 2013
pp. 243-252
Software ecosystems form the heart of modern companies' collaboration strategies with end users, open source developers and other companies. An ecosystem consists of a core platform and a halo of user contributions that provide value to a company or projec...
 
Doubly Penalized LASSO for Reconstruction of Biological Networks
Found in: 2012 IEEE Second International Conference on Healthcare Informatics, Imaging and Systems Biology (HISB)
By Behrang Asadi,Daniel M. Tartakovsky,Mano Ram Maurya,Shankar Subramaniam
Issue Date:September 2012
pp. 129
Reconstruction of biological and biochemical networks is a crucial step in extracting information from a large volume of biological data. There are several methods developed recently to reconstruct biological networks using dynamic data, each with specific...
 
Subjective Video Quality Assessment in Segmentation for Augmented Reality Applications
Found in: 2012 14th Symposium on Virtual and Augmented Reality (SVR)
By Silvio R.R. Sanches,Daniel M. Tokunaga,Valdinei F. Silva,Romero Tori
Issue Date:May 2012
pp. 46-55
Video segmentation to extract a person in foreground has been a common task in many Augmented Reality (AR) applications. In natural environments which the background color and the light environment are not constant the segmentation method must be able to e...
 
RTOS Support for Multicore Mixed-Criticality Systems
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Jonathan L. Herman,Christopher J. Kenna,Malcolm S. Mollison,James H. Anderson,Daniel M. Johnson
Issue Date:April 2012
pp. 197-208
Mixed-criticality scheduling algorithms, which attempt to reclaim system capacity lost to worst-case execution time pessimism, seem to hold great promise for multi core real-time systems, where such loss is particularly severe. However, the unique nature o...
 
Mutual occlusion between real and virtual elements in Augmented Reality based on fiducial markers
Found in: Applications of Computer Vision, IEEE Workshop on
By Silvio R. R. Sanches,Daniel M. Tokunaga,Valdinei F. Silva,Antonio C. Sementille,Romero Tori
Issue Date:January 2012
pp. 49-54
Augmented Reality (AR) systems which use optical tracking with fiducial marker for registration have had an important role in popularizing this technology, since only a personal computer with a conventional webcam is required. However, in most these applic...
 
Real-time FPGA based 3D camera resectioning
Found in: International Games Innovation Conference
By Daniel M. Ho, Feng-ming Zhu, Wai-Chi Fang
Issue Date:November 2011
pp. 66-67
This paper describes an embedded system based framework for processing depth and RGB images. This work provides a FPGA accelerated real-time solution for the problem of resectoning image data from a 3D camera to the coordinates of an RGB camera.
 
Work in progress -- Enhancing the entrepreneurial mindset of freshman engineers
Found in: Frontiers in Education, Annual
By Kenneth J. Reid,Daniel M. Ferguson
Issue Date:October 2011
pp. F2D-1-F2D-3
Our research reports on an ongoing study of the impact of entrepreneurial interventions within first-year engineering courses on changes in the mindsets of engineering students. Entrepreneurial mindset in our study is operationally defined as a more growth...
 
k-Independent Gaussians Fool Polynomial Threshold Functions
Found in: Computational Complexity, Annual IEEE Conference on
By Daniel M. Kane
Issue Date:June 2011
pp. 252-261
We show that limited independence suffices to fool polynomial threshold functions of arbitrary degree.
 
Noncomputable Conditional Distributions
Found in: Logic in Computer Science, Symposium on
By Nathanael L. Ackerman, Cameron E. Freer, Daniel M. Roy
Issue Date:June 2011
pp. 107-116
We study the computability of conditional probability, a fundamental notion in probability theory and Bayesian statistics. In the elementary discrete setting, a ratio of probabilities defines conditional probability. In more general settings, conditional p...
 
Immersive Teleconferencing System Based on Video-Avatar for Distance Learning
Found in: Virtual Reality, Symposium on
By Cléber G. Corrêa, Daniel M. Tokunaga, Silvio R. R. Sanches, Ricardo Nakamura, Romero Tori
Issue Date:May 2011
pp. 197-206
Teleconference is an important means of communication in distance learning courses. Unlike other technologies used in education, the technology that enables virtual conferencing has changed little since it began to be used. Even the transition from analog ...
 
The CubeLab Standard for improved access to the International Space Station
Found in: IEEE Aerospace Conference
By James E. Lumpp, Daniel M. Erb, Twyman S. Clements, Jason T. Rexroat, Michael D. Johnson
Issue Date:March 2011
pp. 1-6
As the International Space Station (ISS) is completed and the US shuttle fleet is retired in 2011, the NanoRacks Platform and CubeLab Standard provide a unique new opportunity for inexpensive repeatable access to the ISS for small payloads. The NanoRacks P...
 
Hardware Particle Swarm Optimization Based on the Attractive-Repulsive Scheme for Embedded Applications
Found in: Reconfigurable Computing and FPGAs, International Conference on
By Daniel M. Muñoz, Carlos H. Llanos, Leandro dos S. Coelho, Mauricio Ayala-Rincón
Issue Date:December 2010
pp. 55-60
Particle Swarm Optimization (PSO) algorithms have been proposed to solve engineering problems that require to find an optimal point of operation. However, the PSO algorithm suffers from \emph{premature convergence} and high elapsed time when solving multim...
 
Parallel Implementations of an Immune Network Model Using POSIX Threads and OpenMP
Found in: Computer Architecture and High Performance Computing Workshops, International Symposium on
By Daniel M. Caldas, Bruno G. de Barros, Marcelo Lobosco
Issue Date:October 2010
pp. 61-66
In the last few years, there has been an increasing interest in the mathematical and computational modeling of the human immune system (HIS). In particular, the use of computational models is fundamental to understand the HIS dynamics. The availability of ...
 
Work in progress -- Measuring and enhancing the entrepreneurial mindset of freshman engineering students
Found in: Frontiers in Education, Annual
By Kenneth J Reid,Daniel M Ferguson
Issue Date:October 2010
pp. F2C-1-F2C-2
Much has been made of the need for our future generations to be more entrepreneurial; that is, creative or innovative, with the ability to act on opportunities. Establishing an entrepreneurial mindset in college students is important to sustain the competi...
 
Bounded Independence Fools Degree-2 Threshold Functions
Found in: Foundations of Computer Science, Annual IEEE Symposium on
By Ilias Diakonikolas, Daniel M. Kane, Jelani Nelson
Issue Date:October 2010
pp. 11-20
For an $n$-variate degree–$2$ real polynomial $p$, we prove that $\E_{x\sim \mathcal{D}}[\sgn(p(x))]$ is determined up to an additive $\eps$ as long as $\mathcal{D}$ is a $k$-wise independent distribution over $\bits^n$ for $k = \poly(1/\eps)$. This gives ...
 
Requirements Determination is Unstoppable: An Experience Report
Found in: Requirements Engineering, IEEE International Conference on
By Daniel M. Berry, Krzysztof Czarnecki, Michal Antkiewicz, Mohamed AbdElRazik
Issue Date:October 2010
pp. 311-316
The paper describes the quotations gathered during interviews and focus groups during a consulting engagement to help the client improve its requirements engineering (RE) process. The paper describes also a model of the software lifecycle derived from a Mi...
 
Optics in Future Data Center Networks
Found in: High-Performance Interconnects, Symposium on
By Laurent Schares, Daniel M. Kuchta, Alan F. Benner
Issue Date:August 2010
pp. 104-108
Optical interconnects offer significant advantages for future high performance data center networks. Progress towards integrating new optical technologies deeper into systems is reviewed, and the prospects for optical architectures beyond point-to-point op...
 
Generalizing Tableau to Any Color of Teaching Boards
Found in: Pattern Recognition, International Conference on
By Daniel M. Oliveira, Rafael D. Lins
Issue Date:August 2010
pp. 2411-2414
Teaching boards are omnipresent in classrooms throughout the world. Tableau is a software environment for processing images from teaching-boards acquired using portable digital cameras and cell-phones. The previous versions of Tableau were restricted to wh...
 
Ethics Test Results Before and After Ethics Training: A Disturbing Experience
Found in: Software Science, Technology and Engineering, IEEE International Conference on
By Daniel M. Berry, Brian Berenbach
Issue Date:June 2010
pp. 70-76
Students in a computers-and-society course learning ethics were given a test to measure the test taker's ethicality both before and after learning ethics. The data show that learning ethics had no effect on the student's ethicality. In some ways, the stude...
 
Understanding and Auditing the Licensing of Open Source Software Distributions
Found in: International Conference on Program Comprehension
By Daniel M. German, Massimiliano Di Penta, Julius Davies
Issue Date:July 2010
pp. 84-93
Free and open source software (FOSS) is often distributed in binary packages, sometimes part of GNU/Linux operating system distributions, or part of products distributed/sold to users. FOSS creates great opportunities for users, developers and integrators,...
 
The Gaussian Surface Area and Noise Sensitivity of Degree-d Polynomial Threshold Functions
Found in: Computational Complexity, Annual IEEE Conference on
By Daniel M. Kane
Issue Date:June 2010
pp. 205-210
We prove asymptotically optimal bounds on the Gaussian noise sensitivity of degree-d polynomial threshold functions. These bounds translate into optimal bounds on the Gaussian surface area of such functions, and therefore imply new bounds on the running ti...
 
An exploratory study of the evolution of software licensing
Found in: Software Engineering, International Conference on
By Massimiliano Di Penta,Daniel M. German,Yann-Gaël Guéhéneuc,Giuliano Antoniol
Issue Date:May 2010
pp. 145-154
Free and open source software systems (FOSS) are distributed and made available to users under different software licenses, mentioned in FOSS code by means of licensing statements. Various factors, such as changes in the legal landscape, commercial code li...
 
Who are Source Code Contributors and How do they Change?
Found in: Reverse Engineering, Working Conference on
By Massimiliano Di Penta, Daniel M. German
Issue Date:October 2009
pp. 11-20
Determining who are the copyright owners of a software system is important as they are the individuals and organizations that license the software to its users, and ultimately the legal entities that can enforce its licensing terms and change its license. ...
 
Bayesian Approaches to Matching Architectural Diagrams
Found in: IEEE Transactions on Software Engineering
By Doug Kimelman, Marsha Kimelman, David Mandelin, Daniel M. Yellin
Publication Date: August 2009
pp. 248-274
IT system architectures and many other kinds of structured artifacts are often described by formal models or informal diagrams. In practice, there are often a number of versions of a model or diagram, such as a series of revisions, divergent variants, or m...
 
A Verification-Centric Software Development Process for Java
Found in: Quality Software, International Conference on
By Daniel M. Zimmerman, Joseph R. Kiniry
Issue Date:August 2009
pp. 76-85
Design by Contract (DBC) is an oft-cited, but rarely followed, programming practice that focuses on writing formal specifications first, and writing code that fulfills those specifications second. The development of static analysis tools over the past seve...
 
Disposal of Disk and Tape Data by Secure Sanitization
Found in: IEEE Security and Privacy
By Gordon F. Hughes, Tom Coughlin, Daniel M. Commins
Issue Date:July 2009
pp. 29-34
User data is often unprotected on disk and tape drives or not erased when no longer needed, creating data security vulnerabilities that many computer users are unaware of. Federal and state laws require data sanitization, which comprises a variety of data ...
 
 1  2 Next >>