Sciweavers

SAC
2009
ACM
14 years 7 months ago
An empirical study of incorporating cost into test suite reduction and prioritization
Software developers use testing to gain and maintain confidence in the correctness of a software system. Automated reduction and prioritization techniques attempt to decrease the...
Adam M. Smith, Gregory M. Kapfhammer
SAC
2009
ACM
14 years 7 months ago
Parameterless outlier detection in data streams
Outlyingness is a subjective concept relying on the isolation level of a (set of) record(s). Clustering-based outlier detection is a field that aims to cluster data and to detect...
Alice Marascu, Florent Masseglia
SAC
2009
ACM
14 years 7 months ago
A systematic method for generating quality requirements spectrum
Spectrum analysis for quality requirements is useful for measuring and tracking them, but current spectrum analysis largely depends on expertise of each analyst. Therefore, it tak...
Shunichi Suzuki, Akira Osada, Tomonori Sato, Haruh...
SAC
2009
ACM
14 years 7 months ago
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang
SAC
2009
ACM
14 years 7 months ago
Bayesian bot detection based on DNS traffic similarity
Ricardo Villamarín-Salomón, Jos&eacu...
SAC
2009
ACM
14 years 7 months ago
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a w...
In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim...
SAC
2009
ACM
14 years 7 months ago
Celling SHIM: compiling deterministic concurrency to a heterogeneous multicore
Parallel architectures are the way of the future, but are notoriously difficult to program. In addition to the low-level constructs they often present (e.g., locks, DMA, and non-...
Nalini Vasudevan, Stephen A. Edwards
SAC
2009
ACM
14 years 7 months ago
HIVSetSubtype: software for subtype classification of HIV-1 sequences
An automated web based tool for assigning HIV-1 pure and recombinant subtypes within unaligned sequences is presented. The system combines the BLAST search algorithm and the recom...
Luciano Vieira de Araújo, Sabri S. Sanabani...
SAC
2009
ACM
14 years 7 months ago
An implementation substrate for languages composing modularized crosscutting concerns
We present the implementation of several programming languages with support for multi-dimensional separation of concerns (MDSOC) on top of a common delegation-based substrate, whi...
Hans Schippers, Michael Haupt, Robert Hirschfeld
SAC
2009
ACM
14 years 7 months ago
Length-lex bound consistency for knapsack constraints
This paper considers the length-lex domain for set-variables in constraint programming which includes not only membership but also cardinality and lexicographic information. The p...
Justin Yip, Pascal Van Hentenryck