Sciweavers

42738 search results - page 8382 / 8548
» Search Computing Systems
Sort
View
ICML
1999
IEEE
16 years 4 months ago
Least-Squares Temporal Difference Learning
Excerpted from: Boyan, Justin. Learning Evaluation Functions for Global Optimization. Ph.D. thesis, Carnegie Mellon University, August 1998. (Available as Technical Report CMU-CS-...
Justin A. Boyan
SIGSOFT
2007
ACM
16 years 3 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
SIGSOFT
2007
ACM
16 years 3 months ago
Which warnings should I fix first?
Automatic bug-finding tools have a high false positive rate: most warnings do not indicate real bugs. Usually bug-finding tools assign important warnings high priority. However, t...
Sunghun Kim, Michael D. Ernst
SIGSOFT
2003
ACM
16 years 3 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ISBI
2008
IEEE
16 years 3 months ago
Quantitative genetic modeling of lateral ventricular shape and volume using multi-atlas fluid image alignment in twins
Despite substantial progress in measuring the 3D profile of anatomical variations in the human brain, their genetic and environmental causes remain enigmatic. We developed an auto...
Yi-Yu Chou, Natasha Lepore, Marina Barysheva, Ming...
« Prev « First page 8382 / 8548 Last » Next »