Sciweavers

861 search results - page 36 / 173
» Predicting Attack-prone Components
Sort
View
WCRE
2010
IEEE
13 years 8 months ago
Predicting Re-opened Bugs: A Case Study on the Eclipse Project
—Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be...
Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid ...
CSB
2004
IEEE
131views Bioinformatics» more  CSB 2004»
14 years 1 months ago
Improved Fourier Transform Method for Unsupervised Cell-Cycle Regulated Gene Prediction
Motivation: Cell-cycle regulated gene prediction using microarray time-course measurements of the mRNA expression levels of genes has been used by several researchers. The popular...
Karuturi R. Krishna Murthy, Liu Jian Hua
HPCA
2008
IEEE
14 years 10 months ago
Performance-aware speculation control using wrong path usefulness prediction
Fetch gating mechanisms have been proposed to gate the processor pipeline to reduce the wasted energy consumption due to wrongpath (i.e. mis-speculated) instructions. These scheme...
Chang Joo Lee, Hyesoon Kim, Onur Mutlu, Yale N. Pa...
ICIP
2009
IEEE
13 years 7 months ago
Light Speed Labeling for RISC architectures
This article introduces a fast algorithm for Connected Component Labeling of binary images called Light Speed Labeling. It is segment-based and a line-relative labeling that was e...
Lionel Lacassagne, Bertrand Zavidovique
ISBI
2002
IEEE
14 years 10 months ago
A spatially robust ICA algorithm for multiple fMRI data sets
In this paper we derive an independent-component analysis (ICA) method for analyzing two or more data sets simultaneously. Our model extracts independent components common to all ...
Ana S. Lukic, Miles N. Wernick, Lars Kai Hansen, J...