Sciweavers

439 search results - page 55 / 88
» Identification of Software Instabilities
Sort
View
DOCENG
2007
ACM
14 years 28 days ago
XML version detection
The problem of version detection is critical in many important application scenarios, including software clone identification, Web page ranking, plagiarism detection, and peer-to-...
Deise de Brum Saccol, Nina Edelweiss, Renata de Ma...
DSOM
2007
Springer
14 years 28 days ago
Bottleneck Detection Using Statistical Intervention Analysis
Abstract. The complexity of today's large-scale enterprise applications demands system administrators to monitor enormous amounts of metrics, and reconfigure their hardware as...
Simon Malkowski, Markus Hedwig, Jason Parekh, Calt...
ER
1995
Springer
109views Database» more  ER 1995»
14 years 17 days ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers
CRIWG
2007
13 years 10 months ago
Fostering Groupware Tailorability Through Separation of Concerns
Groupware must deal with a myriad of concerns. Some of them are typical of “conventional” software while others are idiosyncratic of CSCW applications (e.g., awareness). We cla...
Diego Torres, Alejandro Fernández, Gustavo ...
APBC
2003
13 years 10 months ago
Microarray Image Processing Based on Clustering and Morphological Analysis
Microarrays allow the monitoring of expressions for tens of thousands of genes simultaneously. Image analysis is an important aspect for microarray experiments that can affect sub...
Shuanhu Wu, Hong Yan