Sciweavers

446 search results - page 55 / 90
» A Study of Dead Data Members in C Applications
Sort
View
AICCSA
2006
IEEE
121views Hardware» more  AICCSA 2006»
13 years 10 months ago
Software Defect Prediction Using Regression via Classification
In this paper we apply a machine learning approach to the problem of estimating the number of defects called Regression via Classification (RvC). RvC initially automatically discr...
Stamatia Bibi, Grigorios Tsoumakas, Ioannis Stamel...
ICS
2000
Tsinghua U.
14 years 13 days ago
Hardware-only stream prefetching and dynamic access ordering
Memory system bottlenecks limit performance for many applications, and computations with strided access patterns are among the hardest hit. The streams used in such applications h...
Chengqiang Zhang, Sally A. McKee
GECCO
2008
Springer
174views Optimization» more  GECCO 2008»
13 years 10 months ago
Mask functions for the symbolic modeling of epistasis using genetic programming
The study of common, complex multifactorial diseases in genetic epidemiology is complicated by nonlinearity in the genotype-to-phenotype mapping relationship that is due, in part,...
Ryan J. Urbanowicz, Nate Barney, Bill C. White, Ja...
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 9 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
VLDB
2004
ACM
124views Database» more  VLDB 2004»
14 years 2 months ago
Containment of Nested XML Queries
Query containment is the most fundamental relationship between a pair of database queries: a query Q is said to be contained in a query Q if the answer for Q is always a subset of...
Xin Dong, Alon Y. Halevy, Igor Tatarinov