Sciweavers

3819 search results - page 8 / 764
» Predicting Dependability by Testing
Sort
View
GECCO
2000
Springer
104views Optimization» more  GECCO 2000»
13 years 11 months ago
Quadratic Bloat in Genetic Programming
In earlier work we predicted program size would grow in the limit at a quadratic rate and up to fty generations we measured bloat O(generations1:2;1:5). On two simple benchmarks w...
William B. Langdon
ICML
2010
IEEE
13 years 8 months ago
Forgetting Counts: Constant Memory Inference for a Dependent Hierarchical Pitman-Yor Process
We propose a novel dependent hierarchical Pitman-Yor process model for discrete data. An incremental Monte Carlo inference procedure for this model is developed. We show that infe...
Nicholas Bartlett, David Pfau, Frank Wood
MICRO
1999
IEEE
136views Hardware» more  MICRO 1999»
13 years 12 months ago
Read-After-Read Memory Dependence Prediction
: We identify that typical programs exhibit highly regular read-after-read (RAR) memory dependence streams. We exploit this regularity by introducing read-after-read (RAR) memory d...
Andreas Moshovos, Gurindar S. Sohi
ASPLOS
2009
ACM
14 years 8 months ago
Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging
Software defects, commonly known as bugs, present a serious challenge for system reliability and dependability. Once a program failure is observed, the debugging activities to loc...
Martin Dimitrov, Huiyang Zhou
ICST
2009
IEEE
14 years 2 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams