Sciweavers

6769 search results - page 1291 / 1354
» A new concept of robustness
Sort
View
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 8 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
EDBT
2006
ACM
120views Database» more  EDBT 2006»
14 years 8 months ago
Similarity Search on Time Series Based on Threshold Queries
Similarity search in time series data is required in many application fields. The most prominent work has focused on similarity search considering either complete time series or si...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...
EDBT
2006
ACM
179views Database» more  EDBT 2006»
14 years 8 months ago
TrajPattern: Mining Sequential Patterns from Imprecise Trajectories of Mobile Objects
Abstract. Mobile objects have become ubiquitous in our everyday lives, ranging from cellular phones to sensors, therefore, analyzing and mining mobile data becomes an interesting p...
Jiong Yang, Meng Hu
ICSE
2003
IEEE-ACM
14 years 8 months ago
Source Viewer 3D (sv3D) - A Framework for Software Visualization
2. Support for User Interaction Source Viewer 3D is a software visualization framework that uses a 3D metaphor to represent software system and analysis data. The 3D representation...
Jonathan I. Maletic, Andrian Marcus, Louis Feng
ICSE
2005
IEEE-ACM
14 years 8 months ago
Verifying safety policies with size properties and alias controls
Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typin...
Wei-Ngan Chin, Siau-Cheng Khoo, Shengchao Qin, Cor...
« Prev « First page 1291 / 1354 Last » Next »