Sciweavers

3316 search results - page 33 / 664
» Mining Software Engineering Data
Sort
View
HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
14 years 1 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...
ICTAI
2010
IEEE
13 years 6 months ago
Pocket Data Mining: Towards Collaborative Data Mining in Mobile Computing Environments
Abstract--Pocket Data Mining PDM is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data stre...
Frederic T. Stahl, Mohamed Medhat Gaber, Max Brame...
ICSM
2007
IEEE
14 years 3 months ago
Mining the Lexicon Used by Programmers during Sofware Evolution
Identifiers represent an important source of information for programmers understanding and maintaining a system. Self-documenting identifiers reduce the time and effort necessa...
Giuliano Antoniol, Yann-Gaël Guéh&eacu...
FGCS
2008
148views more  FGCS 2008»
13 years 9 months ago
Grid-enabling data mining applications with DataMiningGrid: An architectural perspective
The DataMiningGrid system has been designed to meet the requirements of modern and distributed data mining scenarios. Based on the Globus Toolkit and other open technology and sta...
Vlado Stankovski, Martin T. Swain, Valentin Kravts...
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
14 years 21 days ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan