Sciweavers

59 search results - page 11 / 12
» Dominating Subsets under Projections
Sort
View
IMC
2010
ACM
13 years 7 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
PROMISE
2010
13 years 4 months ago
On the value of learning from defect dense components for software defect prediction
BACKGROUND: Defect predictors learned from static code measures can isolate code modules with a higher than usual probability of defects. AIMS: To improve those learners by focusi...
Hongyu Zhang, Adam Nelson, Tim Menzies
PLDI
2009
ACM
14 years 10 months ago
Semantics-aware trace analysis
As computer systems continue to become more powerful and comdo programs. High-level abstractions introduced to deal with complexity in large programs, while simplifying human reas...
Kevin J. Hoffman, Patrick Eugster, Suresh Jagannat...
SIGCSE
2010
ACM
187views Education» more  SIGCSE 2010»
14 years 3 months ago
Game-themed programming assignments for faculty: a case study
Despite the proven success of using computer video games as a context for teaching introductory programming (CS1/2) courses, barriers including the lack of adoptable materials, re...
Cinnamon Hillyard, Robin Angotti, Michael Panitz, ...
ELPUB
1999
ACM
14 years 2 months ago
Two Large-Scale Surveys of Electronic Publication in the United Kingdom
The Department of Information Science at Loughborough University has carried out several user studies on electronic journals in recent years, including the ELVYN and Cafe Jus proj...
Fytton Rowland