Sciweavers

406 search results - page 30 / 82
» Identifying Codes and Covering Problems
Sort
View
FASE
2007
Springer
14 years 2 months ago
EQ-Mine: Predicting Short-Term Defects for Software Evolution
We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Jacek Ratzinger, Martin Pinzger, Harald Gall
CODES
1999
IEEE
14 years 1 months ago
A hardware-software cosynthesis technique based on heterogeneous multiprocessor scheduling
In this paper, we propose a fast and simple heuristic for the cosynthesis problem targeting the system-on-chip (SOC) design. The proposed algorithm covers from implementation sele...
Hyunok Oh, Soonhoi Ha
ICSE
2008
IEEE-ACM
14 years 9 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
MAS
1998
Springer
145views Communications» more  MAS 1998»
14 years 27 days ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 5 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan