Sciweavers

726 search results - page 11 / 146
» From Anomaly Reports to Cases
Sort
View
MSR
2010
ACM
15 years 4 months ago
Predicting the severity of a reported bug
—The severity of a reported bug is a critical factor in deciding how soon it needs to be fixed. Unfortunately, while clear guidelines exist on how to assign the severity of a bu...
Ahmed Lamkanfi, Serge Demeyer, Emanuel Giger, Bart...
ISPASS
2006
IEEE
15 years 5 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
TOOLS
2008
IEEE
15 years 6 months ago
Towards Raising the Failure of Unit Tests to the Level of Compiler-Reported Errors
Running unit tests suites with contemporary tools such as JUNIT can show the presence of bugs, but not their locations. This is different from checking a program with a compiler, w...
Friedrich Steimann, Thomas Eichstädt-Engelen,...
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 6 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
ICAIL
2007
ACM
15 years 3 months ago
NLP-based Ontology Learning from Legal Texts. A Case Study
The paper reports on the methodology and preliminary results of a case study in automatically extracting ontological knowledge from Italian legislative texts in the environmental d...
Alessandro Lenci, Simonetta Montemagni, Vito Pirre...