Search
Skip to Search Results- 72Hindle, Abram
- 31Wakaruk, Amanda
- 30University of Alberta
- 29Libraries
- 26McNally, Michael B.
- 18Campbell, Sandy
- 168University of Alberta Library
- 118Toolkit for Grant Success
- 89Toolkit for Grant Success/Educational Materials (Toolkit for Grant Success)
- 71Computing Science, Department of
- 71Computing Science, Department of/Conference Papers (Computing Science)
- 66University of Alberta Library/Libraries Staff Publications
-
2015
Aggarwal, K., Rutgers, T., Timbers, F., Hindle, Abram, Greiner, R., Stroulia, E.
In previous work by Alipour et al., a methodology was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords....
-
2004
Kouritzin, Michael, Kim, Surrey, Sun, Wei, Kim, Hyukjoon
In this note, we consider the problem of detecting network portscans through the use of anomaly detection. First, we introduce some static tests for analyzing traffic rates. Then, we make use of two dynamic chi-square tests to detect anomalous packets. Further, we model network traffic as a...
-
2021-06-15
Reyes Ayala, B., Sun, J., McDevitt, J., Liu, X.
Presentation given at the Web Archiving Conference (WAC) in 2021, hosted by the International Internet Preservation Consortium (IIPC).
-
2009
Newton, Fraser, Kouritzin, Michael, Wu, Biao, Luo, Dandan
Military tanks, cargo or troop carriers, missile carriers or rocket launchers often hide themselves from detection in the forests. This plagues the detection problem of locating these hidden targets. An electro-optic camera mounted on a surveillance aircraft or unmanned aerial vehicle is used to...
-
2021-07-01
Yeganeh Saffar, Shadi Ansari, Reza Azadi, Jan Raffel, David S. Nobes, Reza Sabbagh
Particle image velocimetry (PIV) and particle tracking velocimetry (PTV) are two popular methods to measure the velocity in complex geometries such as the Tesla valve. This paper provides an investigation on the application of a tessellation meshing method for interpolating non-uniform velocity...
-
Determining Project Contingency Reserve Using a Fuzzy Arithmetic-Based Risk Analysis Method
Download2020-01-01
Fateminia, Seyed Hamed, Siraj, Nasir Bedewi, Fayek, Aminah Robinson, Johnston, Andrew
Traditional techniques for estimating contingency reserve fail to capture subjective uncertainties and expert knowledge, and they rely on historical data. This paper proposes a fuzzy risk analysis model (FRAM) that uses fuzzy arithmetic to analyze risk and opportunity events and determine...
-
2011
Godfrey, M., Davis, J., German, D., Hindle, Abram
Software clone detection has made substantial progress in the last 15 years, and software clone analysis is starting to provide real insight into how and why code clones are born, evolve, and sometimes die. In this position paper, we make the case that there is a more general problem lurking in...
-
2023-12-13
Wakaruk, Amanda Zerkee, Jennifer
Slides from a presentation at Government Information Days 2023. Abstract: Reproducing and sharing government publications shouldn’t cause legal chill, but we know that it does. What are your library’s legal rights and how should you navigate Crown copyright controls when embarking on...