Sciweavers

15254 search results - page 3000 / 3051
» A k
Sort
View
SENSYS
2010
ACM
14 years 7 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
SIGSOFT
2010
ACM
14 years 7 months ago
Validity concerns in software engineering research
Empirical studies that use software repository artifacts have become popular in the last decade due to the ready availability of open source project archives. In this paper, we su...
Hyrum K. Wright, Miryung Kim, Dewayne E. Perry
SIGSOFT
2010
ACM
14 years 7 months ago
Differential static analysis: opportunities, applications, and challenges
It is widely believed that program analysis can be more closely targeted to the needs of programmers if the program is accompanied by further redundant documentation. This may inc...
Shuvendu K. Lahiri, Kapil Vaswani, C. A. R. Hoare
97
Voted
SIGSOFT
2010
ACM
14 years 7 months ago
Representation dependence testing using program inversion
The definition of a data structure may permit many different concrete representations of the same logical content. A (client) program that accepts such a data structure as input i...
Aditya Kanade, Rajeev Alur, Sriram K. Rajamani, Ga...
SIGSOFT
2010
ACM
14 years 7 months ago
Organizational volatility and its effects on software defects
The key premise of an organization is to allow more efficient production, including production of high quality software. To achieve that, an organization defines roles and reporti...
Audris Mockus
« Prev « First page 3000 / 3051 Last » Next »