Sciweavers

43 search results - page 6 / 9
» Comparison of Software Reliability Assessment Methods for Op...
Sort
View
SIGSOFT
2003
ACM
14 years 6 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
SIGSOFT
2006
ACM
13 years 11 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
ISBI
2006
IEEE
14 years 6 months ago
An evaluation of three approaches to tetrahedral mesh generation for deformable registration of brain MR images
In this paper we evaluate three conceptually different approaches to mesh generation for deformable Finite Element Method (FEM) registration of Magnetic Resonance (MR) images of b...
Andriy Fedorov, Nikos Chrisochoides, Ron Kikinis, ...
RE
2010
Springer
13 years 12 days ago
Effort and Quality of Recovering Requirements-to-Code Traces: Two Exploratory Experiments
Trace links between requirements and code are essential for many software development and maintenance activities. Despite significant advances in traceability research, creating li...
Alexander Egyed, Florian Graf, Paul Grünbache...
BMCBI
2011
12 years 9 months ago
ShoRAH: estimating the genetic diversity of a mixed sample from next-generation sequencing data
Background: With next-generation sequencing technologies, experiments that were considered prohibitive only a few years ago are now possible. However, while these technologies hav...
Osvaldo Zagordi, Arnab Bhattacharya, Nicholas Erik...