Sciweavers

267 search results - page 53 / 54
» Employing classifying terms for testing model transformation...
Sort
View
CIKM
2010
Springer
13 years 6 months ago
Exploiting site-level information to improve web search
Ranking Web search results has long evolved beyond simple bag-of-words retrieval models. Modern search engines routinely employ machine learning ranking that relies on exogenous r...
Andrei Z. Broder, Evgeniy Gabrilovich, Vanja Josif...
CODES
2010
IEEE
13 years 4 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
14 years 8 days ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
SIGSOFT
2004
ACM
14 years 26 days ago
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite eļ¬...
Jürgen Dingel, Hongzhi Liang
PLDI
2003
ACM
14 years 21 days ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a programā€™s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...