• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 423
Next 10 →

Computational testing : Why, how and how much

by Harvey J Greenberg - ORSA Journal on Computing , 1990
"... This considers the issues associated with performing and reporting computational testing in the context of original research in operations research, particularly in its interface with computer science. The scope includes nonnumerical computations, such as fundamental algorithms and information stru ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
and reporting computational testing. At the same time, some principles are given and some are tacitly assumed. Section 2 suggests broad methods of testing, recognizing strengths and weaknesses of each. Finally, Section 3 gives guidelines for how much computational testing is appropriate, depending on why

Volume I: Computer Science and Software Engineering

by Ioannis Z. Emiris, Victor Y. Pan, Elias P. Tsigaridas, Allen Tucker, Teo Gonzales, Jorge L. Diaz-herrera, Ioannis Z. Emiris, Victor Y. Pan, Elias P. Tsigaridas , 2013
"... Algebraic algorithms deal with numbers, vectors, matrices, polynomials, for-mal power series, exponential and differential polynomials, rational functions, algebraic sets, curves and surfaces. In this vast area, manipulation with matri-ces and polynomials is fundamental for modern computations in Sc ..."
Abstract - Add to MetaCart
Algebraic algorithms deal with numbers, vectors, matrices, polynomials, for-mal power series, exponential and differential polynomials, rational functions, algebraic sets, curves and surfaces. In this vast area, manipulation with matri-ces and polynomials is fundamental for modern computations in Sciences and

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
reliance on networks as the key feature of social morphology. While networks are old forms of social organization, they are now empowered by new information/communication technologies, so that they become able to cope at the same time with exible decentralization, and with focused decision

AND MATHEMATICAL ENGINEERING

by Madeleine Udell, Professor Lester Mackey , 2015
"... ii ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract not found

The Research Paper, and Why We Should Still Care

by Doug Brent
"... The Research Paper, and Why We Should Still Care -Brent 1 In this article, I revisit an orphaned child of writing studies-the -research paper.‖ Discussions of the research paper and how we might teach it remain spotty at best in the writing studies literature. There is still little agreement on the ..."
Abstract - Add to MetaCart
The Research Paper, and Why We Should Still Care -Brent 1 In this article, I revisit an orphaned child of writing studies-the -research paper.‖ Discussions of the research paper and how we might teach it remain spotty at best in the writing studies literature. There is still little agreement

Software Security Engineering in Extreme Programming Methodology: A Systematic Literature Review

by Imran Ghani , ( Universiti , Skudai, Johor, Malaysia Teknologi Malaysia , 2013
"... INTRODUCTION Agile methodologies have had an important impact on software development practices in recent years In this paper, we explore both points of view in detail. We also present our own point of view on the existing agile models, methods and systems that have integrated security into XP pra ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
and Future Research Based on this SLR, we can conclude that some researchers do agree that XP is compatible with software security engineering. However, as such research is still at the beginning stages, specific ideas have yet to be proposed. Some researchers, however, do not agree that security elements

See What You Want to See: Motivational Influences on Visual Perception,”

by Emily Balcetis , David Dunning - Journal of Personality and Social Psychology, , 2006
"... People's motivational states-their wishes and preferences-influence their processing of visual stimuli. In 5 studies, participants shown an ambiguous figure (e.g., one that could be seen either as the letter B or the number 13) tended to report seeing the interpretation that assigned them to o ..."
Abstract - Cited by 79 (1 self) - Add to MetaCart
that arose in psychology during the 1940s and 1950s These initial demonstrations of motivational influences on perception were met with much enthusiasm, which was then followed by withering criticism. To be sure, much of what the New Look theorists proposed has lasted through today and informs contemporary

International Journal of Mechanical Engineering Education 38/2 Learning

by P. B. Kosasih
"... fi nite element methods by building applications ..."
Abstract - Add to MetaCart
fi nite element methods by building applications

Software reverse engineering as a sensemaking task (in press).

by A R Bryant , R F Mills , G L Peterson , M R Grimaila , Adam R Bryant , Robert F Mills , Gilbert L Peterson , Michael R Grimaila - Journal of Information Assurance and Security. , 2012
"... Abstract: Software reverse engineering involves analyzing computer program executables to understand their structure, functionality, and behavior. In this paper, common reverse engineering functions are decomposed to isolate the information-processing and sensemaking subtasks involved. This paper r ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
smaller number of unchecked assumptions than learning about a program from its published application programming interface or even its source code. In this way, reverse engineers can collect observable data about how software actually interfaces with hardware and performs operations. In fact, many people

Extreme Programming and Its Positive Affect on Software Engineering Teams

by Sharifah Lailee Syed-Abdullah , Mazni Omar
"... ABSTRACT This paper presents an early empirical study on Extreme Programming (XP) practices employing Positive Affect metric. The study was conducted on university students doing development projects to gain an insight understanding of the effect of using agile practices on software engineering (SE ..."
Abstract - Add to MetaCart
ABSTRACT This paper presents an early empirical study on Extreme Programming (XP) practices employing Positive Affect metric. The study was conducted on university students doing development projects to gain an insight understanding of the effect of using agile practices on software engineering
Next 10 →
Results 1 - 10 of 423
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University