Sciweavers

16 search results - page 3 / 4
» How long did it take to fix bugs
Sort
View
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
13 years 11 months ago
Core and Periphery in Free/Libre and Open Source Software Team Communications
The concept of the core group of developers is important and often discussed in empirical studies of FLOSS projects. This paper examines the question, “how does one empirically ...
Kevin Crowston, Kangning Wei, Qing Li, James Howis...
ASPLOS
2004
ACM
13 years 10 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
FOCS
1990
IEEE
13 years 9 months ago
Separating Distribution-Free and Mistake-Bound Learning Models over the Boolean Domain
Two of the most commonly used models in computational learning theory are the distribution-free model in which examples are chosen from a fixed but arbitrary distribution, and the ...
Avrim Blum
WISEC
2010
ACM
14 years 1 days ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
IWMM
2009
Springer
107views Hardware» more  IWMM 2009»
13 years 11 months ago
Self-recovery in server programs
It is important that long running server programs retain availability amidst software failures. However, server programs do fail and one of the important causes of failures in ser...
Vijay Nagarajan, Dennis Jeffrey, Rajiv Gupta