We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Evolutionary support vector machines (ESVMs) are a novel technique that assimilates the learning engine of the state-of-the-art support vector machines (SVMs) but evolves the coef...
Ruxandra Stoean, Dumitru Dumitrescu, Mike Preuss, ...
Abstract. Visualization is able to present the rich Web information intuitively and make the Web search/mining more productive. Mobile computing is able to provide the flexibility...
Yi Wang, Li-Zhu Zhou, Jianhua Feng, Lei Xie, Chun ...