Sciweavers

5494 search results - page 974 / 1099
» E-services Management Requirements
Sort
View
96
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
SIGSOFT
2003
ACM
16 years 1 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg
ICDT
2009
ACM
119views Database» more  ICDT 2009»
16 years 1 months ago
Analysis of sampling techniques for association rule mining
In this paper, we present a comprehensive theoretical analysis of the sampling technique for the association rule mining problem. Most of the previous works have concentrated only...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogi...
92
Voted
WWW
2008
ACM
16 years 1 months ago
Context-based Semantic Mediation in Web Service Communities
Communities gather Web services that provide a common functionality, acting as an intermediate layer between end users and Web services. On the one hand, they provide a single endp...
Michael Mrissa, Stefan Dietze, Philippe Thiran, Ch...
111
Voted
WWW
2008
ACM
16 years 1 months ago
User oriented link function classification
Currently most link-related applications treat all links in the same web page to be identical. One link-related application usually requires one certain property of hyperlinks but...
Mingliang Zhu, Weiming Hu, Ou Wu, Xi Li, Xiaoqin Z...