Sciweavers

7978 search results - page 1333 / 1596
» Combining shared-coin algorithms
Sort
View
ISSTA
2010
ACM
15 years 6 months ago
Causal inference for statistical fault localization
This paper investigates the application of causal inference methodology for observational studies to software fault localization based on test outcomes and profiles. This methodo...
George K. Baah, Andy Podgurski, Mary Jean Harrold
ISSTA
2010
ACM
15 years 6 months ago
Exploiting program dependencies for scalable multiple-path symbolic execution
This paper presents a new technique, called Symbolic Program Decomposition (or SPD), for symbolic execution of multiple paths that is more scalable than existing techniques, which...
Raúl A. Santelices, Mary Jean Harrold
CIBB
2008
15 years 6 months ago
Mining Association Rule Bases from Integrated Genomic Data and Annotations
During the last decade, several clustering and association rule mining techniques have been applied to highlight groups of coregulated genes in gene expression data. Nowadays, inte...
Ricardo Martínez, Nicolas Pasquier, Claude ...
CIKM
2008
Springer
15 years 6 months ago
Book search: indexing the valuable parts
With massive book digitization efforts underway, there is a need for developing effective book retrieval strategies. This paper explores the relative contribution of different par...
Walid Magdy, Kareem Darwish
CIKM
2008
Springer
15 years 6 months ago
A metric cache for similarity search
Similarity search in metric spaces is a general paradigm that can be used in several application fields. It can also be effectively exploited in content-based image retrieval syst...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
« Prev « First page 1333 / 1596 Last » Next »