Sciweavers

1129 search results - page 142 / 226
» Finding Similar Failures Using Callstack Similarity
Sort
View
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 4 days ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
BIS
2009
154views Business» more  BIS 2009»
13 years 9 months ago
Using Process Mining to Generate Accurate and Interactive Business Process Maps
Abstract. The quality of today's digital maps is very high. This allows for new functionality as illustrated by modern car navigation systems (e.g., TomTom, Garmin, etc.), Goo...
Wil M. P. van der Aalst
BIOINFORMATICS
2007
190views more  BIOINFORMATICS 2007»
13 years 8 months ago
Towards clustering of incomplete microarray data without the use of imputation
Motivation: Clustering technique is used to find groups of genes that show similar expression patterns under multiple experimental conditions. Nonetheless, the results obtained by...
Dae-Won Kim, Ki Young Lee, Kwang H. Lee, Doheon Le...
ECCV
2008
Springer
14 years 10 months ago
Improving People Search Using Query Expansions
In this paper we are interested in finding images of people on the web, and more specifically within large databases of captioned news images. It has recently been shown that visua...
Thomas Mensink, Jakob J. Verbeek
ASPLOS
2004
ACM
14 years 1 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi