Sciweavers

887 search results - page 65 / 178
» Automated Detection of Design Patterns
Sort
View
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 3 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
ICCAD
2008
IEEE
141views Hardware» more  ICCAD 2008»
15 years 6 months ago
Layout decomposition for double patterning lithography
In double patterning lithography (DPL) layout decomposition for 45nm and below process nodes, two features must be assigned opposite colors (corresponding to different exposures)...
Andrew B. Kahng, Chul-Hong Park, Xu Xu, Hailong Ya...
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
15 years 10 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
IWPC
2008
IEEE
15 years 4 months ago
Identifying Architectural Change Patterns in Object-Oriented Systems
As an object-oriented system evolves, its architecture tends to drift away from the original design. Knowledge of how the system has changed at coarse-grained levels is key to und...
Xinyi Dong, Michael W. Godfrey
ESE
2008
112views Database» more  ESE 2008»
14 years 10 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey