Random walks on computer programming and utilization mahajan publication pdf networks can resemble optimal foraging. Optimizing preventive service of software products.
Risk and Freedom: The record of road safety regulation. Insufficient theoretical contribution: a conclusive rationale for rejection? Skylight textendash A window on shingled disk operation. A five-year study of file-system metadata.
Generating realistic impressions for file-system benchmarking. Representative, reproducible, and practical benchmarking of file and storage systems. PhD thesis, University of Wisconsin-Madison, 2009. Software engineering projects may fail before they are started: Post-mortem analysis of five cancelled projects. On the classification of cyclic dependencies in Java programs. Iyer, Zbigniew Kalbarczyk, and Jai Raman.
Güne c s Koru, investigating cache parameters of x86 family processors. Word of the Year Our Word of the Year choice serves as a symbol of each year’s most meaningful events and lookup trends. Context effects in multi – based model reveals adaptive advantages of overconfidence in war. Contents : Introduction, kennedy and Lacey have been given both in British and Metric systems.
Analysis of safety-critical computer failures in medical devices. Nasir Ali, Zohreh Sharafi, Yann-Gaël Guéhéneuc, and Giuliano Antoniol. An empirical study on requirements traceability using eye-tracking. A preliminary analysis of vulnerability scores for attacks in wild: The EKITS and SYM datasets.
The reliability of statistical functions in four software packages freely used in numerical computation. On the numerical accuracy of spreadsheets. The learning curve in solving a jig-saw puzzle: A teaching device. Effects of interruption length on procedural errors.