Sciweavers

2947 search results - page 482 / 590
» Analyzing Program Analyses
Sort
View
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
16 years 18 days ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
DAC
2003
ACM
16 years 6 days ago
Automatic trace analysis for logic of constraints
Verification of system designs continues to be a major challenge today. Simulation remains the primary tool for making sure that implementations perform as they should. We present...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
ICML
2006
IEEE
16 years 1 days ago
Nightmare at test time: robust learning by feature deletion
When constructing a classifier from labeled data, it is important not to assign too much weight to any single input feature, in order to increase the robustness of the classifier....
Amir Globerson, Sam T. Roweis
ICSE
2009
IEEE-ACM
16 years 1 days ago
Do code clones matter?
Code cloning is not only assumed to inflate maintenance costs but also considered defect-prone as inconsistent changes to code duplicates can lead to unexpected behavior. Conseque...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
ICSE
2008
IEEE-ACM
16 years 1 days ago
Granularity in software product lines
Building software product lines (SPLs) with features is a challenging task. Many SPL implementations support features with coarse granularity ? e.g., the ability to add and wrap e...
Christian Kästner, Martin Kuhlemann, Sven Ape...