Sciweavers

16 search results - page 2 / 4
» What makes a good bug report
Sort
View
ICPR
2004
IEEE
14 years 6 months ago
On Performance Evaluation of Face Detection and Localization Algorithms
When comparing different methods for face detection or localization, one realizes that just simply comparing the reported results is misleading as, even if the results are reporte...
Jean-Philippe Thiran, Sébastien Marcel, Vla...
PLDI
2010
ACM
14 years 2 months ago
Pacer: Proportional Detection of Data Races
Data races indicate serious concurrency bugs such as order, atomicity, and sequential consistency violations. Races are difficult to find and fix, often manifesting only in deploy...
Michael D. Bond, Katherine E. Coons, Kathryn S. Mc...
OOPSLA
2010
Springer
13 years 3 months ago
Composable specifications for structured shared-memory communication
In this paper we propose a communication-centric approach to specifying and checking how multithreaded programs use shared memory to perform inter-thread communication. Our approa...
Benjamin P. Wood, Adrian Sampson, Luis Ceze, Dan G...
ENVSOFT
2006
144views more  ENVSOFT 2006»
13 years 5 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
ESEM
2010
ACM
13 years 3 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams