In data mining, enumerate the frequent or the closed patterns is often the first difficult task leading to the association rules discovery. The number of these patterns represen...
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
In this paper, we present an approach that examines the evolution of code stored in source control repositories. The technique identifies Change Clusters, which can help managers...
Jay Kothari, Ali Shokoufandeh, Spiros Mancoridis, ...
Estimating remaining defects or failures in software can help test managers make release decisions during testing. Several methods exist to estimate defect content, among them a v...
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...