Sciweavers

889 search results - page 122 / 178
» Analysis of Software Engineering Data Using Computational In...
Sort
View
AISS
2010
171views more  AISS 2010»
14 years 4 months ago
An Investigation into Influence Factor of Student Programming Grade Using Association Rule Mining
Computer programming is one of the most essential skills which each graduate has to acquire. However, there are reports that they are unable to write a program well. Researches in...
Mohamad Farhan Mohamad Mohsin, Mohd Helmy Abd Waha...
ISPASS
2006
IEEE
15 years 3 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
81
Voted
SIGSOFT
1995
ACM
15 years 1 months ago
Precise Interprocedural Chopping
The notion of a program slice, originally introduced by Mark Weiser, is a fundamental operation for addressing many software-engineering problems, including program understanding,...
Thomas W. Reps, Genevieve Rosay
DRM
2003
Springer
15 years 2 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
ACMSE
2006
ACM
14 years 11 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray