Sciweavers

2539 search results - page 56 / 508
» Debugging Method Names
Sort
View
KBSE
2007
IEEE
14 years 5 months ago
Assertion-based repair of complex data structures
Programmers have long used assertions to characterize properties of code. An assertion violation signals a corruption in the program state. At such a state, it is standard to term...
Bassem Elkarablieh, Ivan Garcia, Yuk Lai Suen, Sar...
ICDE
2011
IEEE
243views Database» more  ICDE 2011»
13 years 2 months ago
Interactive SQL query suggestion: Making databases user-friendly
— SQL is a classical and powerful tool for querying relational databases. However, it is rather hard for inexperienced users to pose SQL queries, as they are required to be proï¬...
Ju Fan, Guoliang Li, Lizhu Zhou
CEAS
2006
Springer
14 years 2 months ago
The Effects of Anti-Spam Methods on Spam Mail
We provide a model to study the effects of three methods of fighting spam mail, namely (1) increasing the cost of mailing messages, (2) filters, and (3) a do-not-spam registry, on...
Eilon Solan, Eran Reshef
DATESO
2009
101views Database» more  DATESO 2009»
13 years 8 months ago
Dimension Reduction Methods for Iris Recognition
In this paper, we compare performance of several dimension reduction techniques, namely LSI, FastMap, and SDD in Iris recognition. We compare the quality of these methods from both...
Pavel Moravec, Václav Snásel
UM
2007
Springer
14 years 5 months ago
Mobile Opportunistic Planning: Methods and Models
Abstract. We present a study exploring the promise of developing computational systems to support the discovery and execution of opportunistic activities in mobile settings. We int...
Eric Horvitz, Paul Koch, Muru Subramani