Evolutionary Testing (ET) is a kind of efficient method of automatically test case generation, ET uses a kind of meta-heuristic search technique, the Genetic Algorithm, to convert the task of test case generation into...
详细信息
Evolutionary computation (EC) has been successfully applied to a wide range of design problems. There has also been an abundant amount of work in applying interactive ECs in the design of displays, robot behavior, bit...
详细信息
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with ...
详细信息
ISBN:
(纸本)1581139977
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with hundreds of papers on its use in diverse academic fields appearing in the literature (for a comprehensive survey, see [1]). Its use appears to be on the upswing, given the current interest in active learning and teamwork. In computer science, peer review seems to have very broad application. It can be used to evaluate the contributions of various members to a project team;it can be used for design documents and code reviews, in writing assignments, and in capstone project courses. The experience of the panelists is illustrative of the wide range of peer-review practices. This panel will serve to introduce the audience to some of these applications. Since many computer-science instructors have experimented with peer review, we are anxious to have them share their experiences during the open discussion period.
Data Mining & Statistics Analysis is the search for valuable information in large volumes of data. It is now widely used in health care industry. Especially breast cancer is the second most cause of cancer and the...
详细信息
A lock mechanism is essential for synchronization on the multiprocessor systems. The conventional queuing lock has two bus traffics that are the initial and retry of the lock-read This paper proposes the new locking p...
详细信息
This position paper presents arguments for including the properties of processes involved in various approaches to component-based software development in predicting systems properties. It discusses how processes impa...
详细信息
作者:
Lee, Jae-WooSoftware System Lab.
Dept. of Computer Science and Engineering Korea University 1 5-ka Anam-dong SungBuk-ku 136-701 Seoul Korea Republic of
In the Internet and distributed systems, we can always access many application servers for gaining many information or electronic business processing, etc. Despite of those advantages of information technology, there ...
详细信息
作者:
Lee, Jae-WooSoftware System Lab.
Dept. of Computer Science and Engineering Korea University 1 5-ka Anam-dong SungBuk-ku 136-701 Seoul Korea Republic of
Authentication agent enables an authorized user to gain authority in the Internet or distributed computing systems. It is one of the most important problems that application server systems can identify many clients au...
详细信息
To increase the likelihood for software project success, it is important to be able to identify the drivers of success. This paper compares three methods to identify similar projects with the objective to predict proj...
详细信息
Based on our experiences and those of our peers, we hypothesized that in Java code, the majority of declarations that are of reference types are meant to be non-null. Unfortunately, the Java Modeling Language (JML), l...
详细信息
暂无评论