Sciweavers

773 search results - page 52 / 155
» Program Slicing by Calculation
Sort
View
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
15 years 7 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
90
Voted
CSMR
2009
IEEE
15 years 7 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
ACMMSP
2006
ACM
247views Hardware» more  ACMMSP 2006»
15 years 6 months ago
A flexible data to L2 cache mapping approach for future multicore processors
This paper proposes and studies a distributed L2 cache management approach through page-level data to cache slice mapping in a future processor chip comprising many cores. L2 cach...
Lei Jin, Hyunjin Lee, Sangyeun Cho
SIGSOFT
2009
ACM
16 years 1 months ago
SCA: a semantic conflict analyzer for parallel changes
Parallel changes are becoming increasingly prevalent in the development of large scale software system. To further study the relationship between parallel changes and faults, we h...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
109
Voted
FUIN
2007
109views more  FUIN 2007»
15 years 16 days ago
Computing Properties of Numerical Imperative Programs by Symbolic Computation
We show how properties of an interesting class of imperative programs can be calculated by means of relational modeling and symbolic computation. The ideas of [5, 26] are implement...
Jacques Carette, Ryszard Janicki