Sciweavers

1244 search results - page 242 / 249
» Searching in Higher Dimension
Sort
View
ISSTA
2010
ACM
13 years 10 months ago
OCAT: object capture-based automated testing
Testing object-oriented (OO) software is critical because OO languages are commonly used in developing modern software systems. In testing OO software, one important and yet chall...
Hojun Jaygarl, Sunghun Kim, Tao Xie, Carl K. Chang
MSR
2010
ACM
13 years 10 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
CIVR
2008
Springer
125views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Leveraging user query log: toward improving image data clustering
Image clustering is useful in many retrieval and classification applications. The main goal of image clustering is to partition a given dataset into salient clusters such that the...
Hao Cheng, Kien A. Hua, Khanh Vu
SBBD
2008
256views Database» more  SBBD 2008»
13 years 10 months ago
Indexing Internal Memory with Minimal Perfect Hash Functions
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...
ECIS
2003
13 years 10 months ago
Strategies to reduce information asymmetry in web service market
The web service model provides fundamental advantages compared to the classical software usage model. But transactions in the web service market have by far not reached the expect...
Gerrit Tamm, Maria Wünsche