Sciweavers

2995 search results - page 88 / 599
» On multi-avoidance of generalized patterns
Sort
View
ICSE
2003
IEEE-ACM
14 years 7 months ago
On the Uniformity of Software Evolution Patterns
Preparations for Y2K reminded the software engineering community of the extent to which long-lived software systems are embedded in our daily environments. As systems are maintain...
Evelyn J. Barry, Chris F. Kemerer, Sandra Slaughte...
WOSP
2010
ACM
14 years 2 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
SIGSOFT
2009
ACM
14 years 2 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
ICDM
2009
IEEE
155views Data Mining» more  ICDM 2009»
14 years 2 months ago
A Contrast Pattern Based Clustering Quality Index for Categorical Data
Since clustering is unsupervised and highly explorative, clustering validation (i.e. assessing the quality of clustering solutions) has been an important and long standing researc...
Qingbao Liu, Guozhu Dong
ICTAI
2008
IEEE
14 years 2 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang