Sciweavers

726 search results - page 87 / 146
» From Anomaly Reports to Cases
Sort
View
ICSE
2007
IEEE-ACM
15 years 12 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
MOBISYS
2007
ACM
15 years 11 months ago
Simplifying cyber foraging for mobile devices
Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remo...
Rajesh Krishna Balan, Darren Gergle, Mahadev Satya...
CEC
2009
IEEE
15 years 6 months ago
Mobile processes, mobile channels and complex dynamic systems
— This paper explores a process-oriented approach to complex systems design, using massive fine-grained concurrency, mobile channels and mobile processes. The complex systems st...
Eric Bonnici, Peter H. Welch
IWPC
2009
IEEE
15 years 6 months ago
BugFix: A learning-based tool to assist developers in fixing bugs
We present a tool called BugFix that can assist developers in fixing program bugs. Our tool automatically analyzes the debugging situation at a statement and reports a prioritize...
Dennis Jeffrey, Min Feng, Neelam Gupta, Rajiv Gupt...
COCOON
2007
Springer
15 years 6 months ago
Streaming Algorithms Measured in Terms of the Computed Quantity
The last decade witnessed the extensive studies of algorithms for data streams. In this model, the input is given as a sequence of items passing only once or a few times, and we ar...
Shengyu Zhang