Sciweavers

13631 search results - page 2539 / 2727
» Event-Based Performance Analysis
Sort
View
ICML
1995
IEEE
14 years 10 months ago
Learning to Make Rent-to-Buy Decisions with Systems Applications
In the single rent-to-buy decision problem, without a priori knowledge of the amount of time a resource will be used we need to decide when to buy the resource, given that we can ...
P. Krishnan, Philip M. Long, Jeffrey Scott Vitter
ICSE
2008
IEEE-ACM
14 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
ICSE
2008
IEEE-ACM
14 years 10 months ago
The effect of the number of inspectors on the defect estimates produced by capture-recapture models
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...
SIGSOFT
2008
ACM
14 years 10 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
SIGSOFT
2005
ACM
14 years 10 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...
« Prev « First page 2539 / 2727 Last » Next »