Sciweavers

678 search results - page 129 / 136
» Extended Traits for Model Driven Software Development
Sort
View
114
Voted
ISSTA
2009
ACM
15 years 6 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
CODES
2008
IEEE
15 years 6 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
CADE
2005
Springer
16 years 20 days ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
107
Voted
BMCBI
2010
122views more  BMCBI 2010»
15 years 15 days ago
Genome3D: A viewer-model framework for integrating and visualizing multi-scale epigenomic information within a three-dimensional
Background: New technologies are enabling the measurement of many types of genomic and epigenomic information at scales ranging from the atomic to nuclear. Much of this new data i...
Thomas M. Asbury, Matt Mitman, Jijun Tang, W. Jim ...
ANOR
2011
175views more  ANOR 2011»
14 years 7 months ago
Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection
A vital task facing government agencies and commercial organizations that report data is to represent the data in a meaningful way and simultaneously to protect the confidentialit...
Fred Glover, Lawrence H. Cox, Rahul Patil, James P...