Sciweavers

298 search results - page 32 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
OOPSLA
2007
Springer
14 years 2 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma
SOSP
2007
ACM
14 years 5 months ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
CVPR
2010
IEEE
14 years 5 months ago
Authority-Shift Clustering: Hierarchical Clustering by Authority Seeking on Graphs
In this paper, a novel hierarchical clustering method using link analysis techniques is introduced. The algorithm is formulated as an authority seeking procedure on graphs, which c...
Minsu Cho (Seoul National University), Kyoung Mu L...
IJCAI
2007
13 years 10 months ago
Online Learning and Exploiting Relational Models in Reinforcement Learning
In recent years, there has been a growing interest in using rich representations such as relational languages for reinforcement learning. However, while expressive languages have ...
Tom Croonenborghs, Jan Ramon, Hendrik Blockeel, Ma...
AAAI
1994
13 years 10 months ago
Retrieving Semantically Distant Analogies with Knowledge-Directed Spreading Activation
Techniques that traditionally have been useful for retrieving same-domain analogies from small single-use knowledge bases, such as spreading activation and indexing on selected fe...
Michael Wolverton, Barbara Hayes-Roth