Sciweavers

2384 search results - page 381 / 477
» Analyzing Requirements Engineering Processes: A Case Study
Sort
View
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
15 years 10 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han
EDBTW
2010
Springer
15 years 10 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
ISPASS
2009
IEEE
15 years 10 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...
ICSE
2009
IEEE-ACM
15 years 10 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ISSRE
2008
IEEE
15 years 10 months ago
Automated Generation of Pointcut Mutants for Testing Pointcuts in AspectJ Programs
Aspect-Oriented Programming (AOP) provides new modularization of software systems by encapsulating crosscutting concerns. AspectJ, an AOP language, uses abstractions such as point...
Prasanth Anbalagan, Tao Xie