Sciweavers

4491 search results - page 344 / 899
» Algorithm Engineering
Sort
View
127
Voted
TAPSOFT
1997
Springer
15 years 8 months ago
Set Operations for Recurrent Term Schematizations
Abstract. Reasoning on programs and automated deduction often require the manipulation of in nite sets of objects. Many formalisms have been proposed to handle such sets. Here we d...
Ali Amaniss, Miki Hermann, Denis Lugiez
COMPSAC
2010
IEEE
15 years 1 months ago
Minimising the Preparation Cost of Runtime Testing Based on Testability Metrics
Abstract--Test cost minimisation approaches have traditionally been devoted to minimising "execution costs", while maximising coverage or reliability. However, in a runti...
Alberto González-Sanchez, Éric Piel,...
ICDE
2010
IEEE
295views Database» more  ICDE 2010»
15 years 10 months ago
K nearest neighbor queries and kNN-Joins in large relational databases (almost) for free
— Finding the k nearest neighbors (kNN) of a query point, or a set of query points (kNN-Join) are fundamental problems in many application domains. Many previous efforts to solve...
Bin Yao, Feifei Li, Piyush Kumar
ECLIPSE
2007
ACM
15 years 7 months ago
Predicting buggy changes inside an integrated development environment
We present a tool that predicts whether the software under development inside an IDE has a bug. An IDE plugin performs this prediction, using the Change Classification technique t...
Janaki T. Madhavan, E. James Whitehead Jr.
VLDB
2005
ACM
109views Database» more  VLDB 2005»
15 years 9 months ago
Link Spam Alliances
Link spam is used to increase the ranking of certain target web pages by misleading the connectivity-based ranking algorithms in search engines. In this paper we study how web pag...
Zoltán Gyöngyi, Hector Garcia-Molina