Sciweavers

696 search results - page 115 / 140
» A class of combinatorial identities
Sort
View
128
Voted
ISSRE
2005
IEEE
15 years 7 months ago
Helping End-Users "Engineer" Dependable Web Applications
End-user programmers are increasingly relying on web authoring environments to create web applications. Although often consisting primarily of web pages, such applications are inc...
Sebastian G. Elbaum, Kalyan-Ram Chilakamarri, Bhuv...
METRICS
2005
IEEE
15 years 7 months ago
On Refactoring Support Based on Code Clone Dependency Relation
Generally, code clones are regarded as one of the factors that make software maintenance more difficult. A code clone is a set of source code fragments identical or similar to ea...
Norihiro Yoshida, Yoshiki Higo, Toshihiro Kamiya, ...
SAC
2005
ACM
15 years 7 months ago
Using object-level run-time metrics to study coupling between objects
In this paper we present an investigation into the run-time behaviour of objects in Java programs, using specially adapted coupling metrics. We identify objects from the same clas...
Áine Mitchell, James F. Power
SIGECOM
2005
ACM
109views ECommerce» more  SIGECOM 2005»
15 years 7 months ago
From optimal limited to unlimited supply auctions
We investigate the class of single-round, sealed-bid auctions for a set of identical items in unlimited supply. We adopt the worst-case competitive framework defined by [8, 4] th...
Jason D. Hartline, Robert McGrew
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
15 years 7 months ago
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data
Decision makers of companies often face the dilemma of whether to release data for knowledge discovery, vis a vis the risk of disclosing proprietary or sensitive information. Whil...
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Rames...