Sciweavers

82 search results - page 12 / 17
» Finding similar questions in large question and answer archi...
Sort
View
PASTE
2010
ACM
15 years 2 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
ESEM
2009
ACM
15 years 25 days ago
Understanding the use of inheritance with visual patterns
The goal of this work is to visualize inheritance in objectoriented programs to help its comprehension. We propose a single, compact view of all class hierarchies at once using a ...
Simon Denier, Houari A. Sahraoui
80
Voted
ICDT
2010
ACM
161views Database» more  ICDT 2010»
15 years 7 months ago
Composition with Target Constraints
It is known that the composition of schema mappings, each specified by source-to-target tgds (st-tgds), can be specified by a secondorder tgd (SO tgd). We consider the question of...
Marcelo Arenas, Ronald Fagin, Alan Nash
WABI
2005
Springer
15 years 3 months ago
Time-Window Analysis of Developmental Gene Expression Data with Multiple Genetic Backgrounds
d Abstract] Tamir Tuller , Efrat Oron , Erez Makavy , Daniel A. Chamovitz † , and Benny Chor ‡ Tel-Aviv University, Tel-Aviv 69978, Israel. Abstract. We study gene expression d...
Tamir Tuller, Efrat Oron, Erez Makavy, Daniel A. C...
AAAI
1998
14 years 11 months ago
Supermodels and Robustness
When search techniques are used to solve a practical problem, the solution produced is often brittle in the sense that small execution difficulties can have an arbitrarily large e...
Matthew L. Ginsberg, Andrew J. Parkes, Amitabha Ro...