Sciweavers

1728 search results - page 295 / 346
» Advanced empirical testing
Sort
View
WCRE
2009
IEEE
15 years 11 months ago
An Exploratory Study of the Impact of Code Smells on Software Change-proneness
—Code smells are poor implementation choices, thought to make object-oriented systems hard to maintain. In this study, we investigate if classes with code smells are more change-...
Foutse Khomh, Massimiliano Di Penta, Yann-Gaë...
IFIP
2007
Springer
15 years 10 months ago
Capable Leader and Skilled and Motivated Team Practices to Introduce eXtreme Programming
Abstract. Applying changes to software engineering processes in organisations usually raises many problems of varying nature. Basing on a real-world 2-year project and a simultaneo...
Lech Madeyski, Wojciech Biela
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 10 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ADMA
2005
Springer
157views Data Mining» more  ADMA 2005»
15 years 10 months ago
Learning k-Nearest Neighbor Naive Bayes for Ranking
Accurate probability-based ranking of instances is crucial in many real-world data mining applications. KNN (k-nearest neighbor) [1] has been intensively studied as an effective c...
Liangxiao Jiang, Harry Zhang, Jiang Su
GECCO
2004
Springer
123views Optimization» more  GECCO 2004»
15 years 10 months ago
Heuristic Methods for Solving Euclidean Non-uniform Steiner Tree Problems
In this paper, we consider a variation of the Euclidean Steiner Tree Problem in which the space underlying the set of nodes has a specified non-uniform cost structure. This proble...
Ian Frommer, Bruce L. Golden, Guruprasad Pundoor