Sciweavers

2287 search results - page 270 / 458
» Making it Real
Sort
View
CAV
2009
Springer
123views Hardware» more  CAV 2009»
15 years 8 months ago
On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure
We consider the decision problem for quantifier-free formulas whose atoms are linear inequalities interpreted over the reals or rationals. This problem may be decided using satisf...
David Monniaux
PROFES
2010
Springer
15 years 8 months ago
Regularities in Learning Defect Predictors
Collecting large consistent data sets for real world software projects is problematic. Therefore, we explore how little data are required before the predictor performance plateaus...
Burak Turhan, Ayse Basar Bener, Tim Menzies
160
Voted
KDD
2010
ACM
218views Data Mining» more  KDD 2010»
15 years 7 months ago
Online multiscale dynamic topic models
We propose an online topic model for sequentially analyzing the time evolution of topics in document collections. Topics naturally evolve with multiple timescales. For example, so...
Tomoharu Iwata, Takeshi Yamada, Yasushi Sakurai, N...
FOAL
2007
ACM
15 years 7 months ago
On bytecode slicing and aspectJ interferences
AspectJ aims at managing tangled concerns in Java systems. Crosscutting aspect definitions are woven into the Java bytecode at compile-time. Whether the better modularization intr...
Antonio Castaldo D'Ursi, Luca Cavallaro, Mattia Mo...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 7 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson