Sciweavers

1629 search results - page 96 / 326
» Infeasible Code Detection
Sort
View
NECO
2000
133views more  NECO 2000»
14 years 9 months ago
Neural Coding: Higher-Order Temporal Patterns in the Neurostatistics of Cell Assemblies
Recent advances in the technology of multi-unit recordings make it possible to test Hebb's hypothesis that neurons do not function in isolation but are organized in assemblie...
Laura Martignon, Gustavo Deco, Kathryn B. Laskey, ...
ISESE
2003
IEEE
15 years 3 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
ICSE
2012
IEEE-ACM
13 years 8 days ago
Detecting similar software applications
—Although popular text search engines allow users to retrieve similar web pages, source code search engines do not have this feature. Detecting similar applications is a notoriou...
Collin McMillan, Mark Grechanik, Denys Poshyvanyk
SIGSOFT
2005
ACM
15 years 10 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
FLAIRS
2003
14 years 11 months ago
Bayesian Classification of Triage Diagnoses for the Early Detection of Epidemics
The distribution of illnesses reported by emergency departments from hospitals in a region under surveillance is particularly informative for the early detection of epidemics. The...
Robert T. Olszewski