Sciweavers

1963 search results - page 21 / 393
» How is aliasing used in systems software
Sort
View
ECML
2007
Springer
14 years 3 months ago
Using Text Mining and Link Analysis for Software Mining
Many data mining techniques are these days in use for ontology learning – text mining, Web mining, graph mining, link analysis, relational data mining, and so on. In the current ...
Miha Grcar, Marko Grobelnik, Dunja Mladenic
GECCO
2006
Springer
161views Optimization» more  GECCO 2006»
14 years 19 days ago
An empirical investigation of how and why neutrality affects evolutionary search
The effects of neutrality on evolutionary search have been considered in a number of interesting studies, the results of which, however, have been contradictory. Some researchers ...
Edgar Galván López, Riccardo Poli
ASE
2011
13 years 4 months ago
Compositional model checking of software product lines using variation point obligations
This paper introduces a technique for incremental and compositional model checking that allows efficient reuse of model-checking results associated with the features in a product l...
Jing Liu, Samik Basu, Robyn R. Lutz
ISSRE
2007
IEEE
13 years 10 months ago
Predicting Subsystem Failures using Dependency Graph Complexities
In any software project, developers need to be aware of existing dependencies and how they affect their system. We investigated the architecture and dependencies of Windows Server...
Thomas Zimmermann, Nachiappan Nagappan
COMPSAC
2003
IEEE
14 years 2 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han