Sciweavers

5344 search results - page 310 / 1069
» Privacy-Preserving Set Operations
Sort
View
SAC
2008
ACM
15 years 3 months ago
Automatic software fault localization using generic program invariants
Despite extensive testing in the development phase, residual defects can be a great threat to dependability in the operational phase. This paper studies the utility of lowcost, ge...
Rui Abreu, Alberto González 0002, Peter Zoe...
ML
2010
ACM
210views Machine Learning» more  ML 2010»
15 years 2 months ago
Mining frequent closed rooted trees
Many knowledge representation mechanisms are based on tree-like structures, thus symbolizing the fact that certain pieces of information are related in one sense or another. There ...
José L. Balcázar, Albert Bifet, Anto...
OOPSLA
2010
Springer
15 years 2 months ago
MetaFJig: a meta-circular composition language for Java-like classes
We propose a Java-like language where class denitions are rst class values, hence new classes can be derived from existing, rather than by a xed mechanism like inheritance, by e...
Marco Servetto, Elena Zucca
GLOBECOM
2010
IEEE
15 years 2 months ago
Predicting Critical Intradomain Routing Events
Network equipments generate an overwhelming number of reports and alarms every day, but only a small fraction of these alarms require the intervention of network operators. Our goa...
Amelie Medem Kuatse, Renata Teixeira, Nicolas Usun...
ICTAI
2010
IEEE
15 years 2 months ago
An Effective Multilevel Memetic Algorithm for Balanced Graph Partitioning
The balanced graph partitioning consists in dividing the vertices of an undirected graph into a given number of subsets of approximately equal size, such that the number of edges c...
Una Benlic, Jin-Kao Hao