Sciweavers

3 search results - page 1 / 1
» Identifying bug signatures using discriminative graph mining
Sort
View
143
Voted
ISSTA
2009
ACM
15 years 10 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
167
Voted
SETN
2004
Springer
15 years 8 months ago
Computationally Intelligent Methods for Mining 3D Medical Images
We present novel intelligent tools for mining 3D medical images. We focus on detecting discriminative Regions of Interest (ROIs) and mining associations between their spatial distr...
Despina Kontos, Vasileios Megalooikonomou, Fillia ...
149
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...