Sciweavers

1477 search results - page 253 / 296
» Pattern Matching with Swaps
Sort
View
SIGCSE
2008
ACM
138views Education» more  SIGCSE 2008»
13 years 8 months ago
Debugging: the good, the bad, and the quirky -- a qualitative analysis of novices' strategies
A qualitative analysis of debugging strategies of novice Java programmers is presented. The study involved 21 CS2 students from seven universities in the U.S. and U.K. Subjects &q...
Laurie Murphy, Gary Lewandowski, Renée McCa...
SIGOPS
2008
123views more  SIGOPS 2008»
13 years 8 months ago
Comparative evaluation of overlap strategies with study of I/O overlap in MPI-IO
Many scientific applications use parallel I/O to meet the low latency and high bandwidth I/O requirement. Among many available parallel I/O operations, collective I/O is one of th...
Christina M. Patrick, Seung Woo Son, Mahmut T. Kan...
TCAD
2008
201views more  TCAD 2008»
13 years 8 months ago
Bitmask-Based Code Compression for Embedded Systems
Embedded systems are constrained by the available memory. Code-compression techniques address this issue by reducing the code size of application programs. It is a major challenge ...
Seok-Won Seong, Prabhat Mishra
ISCI
2007
170views more  ISCI 2007»
13 years 8 months ago
Automatic learning of cost functions for graph edit distance
Graph matching and graph edit distance have become important tools in structural pattern recognition. The graph edit distance concept allows us to measure the structural similarit...
Michel Neuhaus, Horst Bunke
TCSV
2008
150views more  TCSV 2008»
13 years 8 months ago
Mining Recurring Events Through Forest Growing
Recurring events are short temporal patterns that consist of multiple instances in the target database. Without any a priori knowledge of the recurring events, in terms of their le...
Junsong Yuan, Jingjing Meng, Ying Wu, Jiebo Luo