400,286 Hits in 8.2 sec

An application of group testing to the file comparison problem

T. Madej
[1989] Proceedings. The 9th International Conference on Distributed Computing Systems  
In this paper we exploit some ideas from non-adaptive group testing to obtain a solution to this problem for the case of arbitrary d .  ...  The file comparison problem involves the detection of differences between two copies of the same file located at different sites in a distributed computing system.  ...  . , A,,, } of group tests that is a d-test set, we can solve the file comparison problem using the following procedure.  ... 
doi:10.1109/icdcs.1989.37952 dblp:conf/icdcs/Madej89 fatcat:uoyzhhwhwnf3bnhlmnbk6s34ea

Performance on the File-Remmers test, How Supervise? before and after a course in psychology

Harry W. Karn
1949 Journal of Applied Psychology  
There is little difference between mean scores of the two groups on the initial test, an insignificant increase by the control group on the retest, and a Performance on the File-Remmers Test Table 3 Comparison  ...  The construction of the original forms of this test is described in an article by File (1).  ... 
doi:10.1037/h0056171 fatcat:da7r5s5esrhcbih2xdkc2bcd4i

DDTS: A Practical System Testing Framework for Scientific Software [article]

Paul Madden, Eduardo G. Valente Jr
2014 arXiv   pre-print
They may need to run (and test) on restrictive HPC platforms. They almost certainly face time and budget pressures that can keep testing languishing near the bottom of their to-do lists.  ...  It decomposes the testing problem into practical, intuitive phases; makes configuration and extension easy; is portable and suitable to HPC platforms; and exploits parallelism.  ...  ACKNOWLEDGMENT The authors would like to thank Tom Henderson, whose original test system for FIM defined (and met) many of the DDTS design criteria, and whose feedback on the design and implementation  ... 
arXiv:1410.8844v2 fatcat:dueqx7cggjhyvkvnwqqrm5z3sa

BioShell 3.0: Library for Processing Structural Biology Data

Joanna M. Macnar, Natalia A. Szulc, Justyna D. Kryś, Aleksandra E. Badaczewska-Dawid, Dominik Gront
2020 Biomolecules  
The full functionality of the package assumes knowledge of C++ or Python to assemble an application using this software library.  ...  A new testing platform has been implemented to continuously test the correctness and integrity of the package.  ...  Discussion Throughout its history, the BioShell package has been applied to numerous problems studied by several groups all over the world.  ... 
doi:10.3390/biom10030461 pmid:32188163 pmcid:PMC7175226 fatcat:ied4ogarojgt3dk3ylvax7b434

SUBSET: Best Subsets Using Information Criteria

C. Mitchell Dayton
2001 Journal of Statistical Software  
SUBSET offers an alternative approach to traditional posthoc multiple-comparison procedures such as the Tukey test for pairwise comparisons.  ...  All possible configurations of ordered subsets of groups are identified and the best model is selected using either the AIC or BIC information criterion.  ...  The input to SUBSET and the output generated by SUBSET are:  ... 
doi:10.18637/jss.v006.i02 fatcat:i43ei3p2czcldagfmu232p4ywm


Asmaa Yasin, Bana Ahmed, Reem El Hadary, Yahia Hasan Jazyah
2020 International Journal of Engineering Technologies and Management Research  
The algorithm is based on designing an additional thread to monitor and control the process of testing the source code. The algorithm is efficient and achieves high percentage of success.  ...  In some cases, meeting face to face is not available for competent, so this research develops an algorithm for training and examining the source code of user.  ...  We thank everybody who assisted us to improve the study.  ... 
doi:10.29121/ijetmr.v5.i12.2018.336 fatcat:7siae6wuafc3ldyvh7xqygye5m

Selection of Collaborative Tools

Tom Kane, Jon Baggaley
2002 International Review of Research in Open and Distance Learning  
In the effort to respond to this interest, the Centre conducted a series of trials of conferencing and other file-sharing products.  ...  The previous report summarised the findings of an online survey concerning Master's of Distance Education students' attitudes to online collaborative tools.  ...  A features comparison of all seven products featured in these tests is presented in Appendix 1. a.  ... 
doi:10.19173/irrodl.v2i2.45 fatcat:rqek2dvewfc3lnwyuunrwm3ije

Mobile Learning Application Impact Towards Student Performance in Programming Subject

Nurul Farahah Abdul Halim, Danakorn Nincarean Eh Phon
2020 IOP Conference Series: Materials Science and Engineering  
Next, a preexperimental one group pretest-posttest research design was employed with 17 students as respondents to examine the impact of mobile learning application.  ...  The paired sample t-test of student's pre-test and post-test scores demonstrate that there were no significant differences before and after the treatment through mobile learning application given.  ...  Acknowledgement The authors would like to thank the Universiti Malaysia Pahang (UMP) for the financial support through RDU Grant Vot No. RDU180361 initiated by UMP.  ... 
doi:10.1088/1757-899x/769/1/012056 fatcat:zs4z2qzysvcmnas4aqu7hfeuia

Interoperable Methodologies and Techniques in CAD [chapter]

Semiha Kiziltas, Fernanda Leite, Burcu Akinci, Robert Lipman
2009 CAD and GIS Integration  
Lack of or inadequate interoperability results in data and transfer problems and duplication of business transactions across multiple software applications used between architects, owners, engineers, suppliers  ...  This chapter is an overview of interoperable methodologies and techniques in computer-aided design (CAD).  ...  An interoperability test was carried out by the Danish chapter of the IAI (IAI Denmark 2006) that modeled a simple structure in five CAD applications, exported the model as an IFC file, and imported the  ... 
doi:10.1201/9781420068061-c4 fatcat:rkm7mwr3i5e6fn3f5lkxqk4i7m

Android Malware Detection: Building Useful Representations

Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Juha Karhunen
2016 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)  
The problem of proactively detecting Android Malware has proven to be a challenging one.  ...  In particular we show that many feature groups that can be extracted from Android application packages, like features extracted from the manifest file or strings extracted from the Dalvik Executable (DEX  ...  With 20% of the files belonging to the test set, the proposed algorithm achieved a FP rate of 2% and TP rate of 91%.  ... 
doi:10.1109/icmla.2016.0041 dblp:conf/icmla/SayfullinaEKPK16 fatcat:jegfdrtykrbjrbor7yvqtuash4

Efficient Software for Archiving and Retrieving Results of Massive Bioinformatics Analyses in High-Performance Computing Environments

Craig P Steffen, Roland Haas, Katherine Kendig, Liudmila Mainzer, Ryan Chui, Christina Fliege
2021 Zenodo  
The difficulty stems chiefly from the structure of file collections being produced: frequently very large number of files, with a highly nested directory structure, and a heterogeneous distribution of  ...  Parallel file systems, such as Lustre, GPFS, and tape archives, can perform poorly under these circumstances due to overabundance of metadata.  ...  ACKNOWLEDGMENT Many thanks to the NCSA Industry Program for access to the iForge supercomputer for these tests. at the University of Illinois Urbana-Champaign The testing on Stampede 2 was run on exploratory  ... 
doi:10.5281/zenodo.5805629 fatcat:avnfbxcjzvew3p54dui3yxzz7i

Automatic Challenge Generation for Teaching Computer Security

Ricardo De la Rocha Ladeira, Rafael Rodrigues Obelheiro
2019 CLEI Electronic Journal  
This work proposes the use of randomization to generate problems and entire competitions in an automated way, obtaining exclusive instances of problems for each player.  ...  The creation of these games requires specialized knowledge to develop new problems, since the novelty of these games is important to reach the desired level of difficulty and to ensure competitiveness.  ...  Acknowledgements The authors would like to thank the Catarinense Instituto Federal and the State University of Santa Catarina, which made possible to carry out this work.  ... 
doi:10.19153/cleiej.22.3.7 fatcat:twcxch4vfzckzn4w6qwgbtvchy

Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

Dragutin KERMEK, Matija NOVAK
2016 Informatics in Education. An International Journal  
However, for larger student assignments and projects that involve a lot of source code files these tools are not so effective.  ...  The proposed model is tested on assignments in three courses in two subsequent academic years.  ...  The comparison of the tools was performed on the same datasets that were mentioned previously. To have a controlled comparison six tests were made T1 to T6 (details in Table 3 ).  ... 
doi:10.15388/infedu.2016.06 fatcat:ucl5eciorrbmloissrpmtyhlou

Page 10 of The Information Management Journal Vol. 31, Issue 2 [page]

1997 The Information Management Journal  
During the application, access to filed copies of accepted applica- tions can be very revealing and instructive to each applicant. test-banks of exam-type questions These databases are composed of questions  ...  The test questions must be accumulated to such an ex- tent as to provide an evolving database which can expand with the learning curve and with the chang- ing class make-up of the study group participants  ... 

Mining Treatment-Outcome Constructs from Sequential Software Engineering Data [article]

Maleknaz Nayebi, Guenther Ruhe, Thomas Zimmermann
2019 arXiv   pre-print
We demonstrate the applicability of this method for empirical studies on sequences of file editing, code ownership, and release cycle time.  ...  We describe GWM and classes of problems to which GWM can be applied.  ...  We are grateful to Bram Adams for helpful discussions on a former version of the paper.  ... 
arXiv:1901.05604v1 fatcat:mrfrt6wmqbhq5gsu7cd6ztnutq
« Previous Showing results 1 — 15 out of 400,286 results