Sciweavers

511 search results - page 31 / 103
» Spelling Correction Using Context
Sort
View
117
Voted
ISSTA
2009
ACM
15 years 7 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
FMOODS
2003
15 years 2 months ago
Inheritance of Temporal Logic Properties
Abstract. Inheritance is one of the key features for the success of objectoriented languages. Inheritance (or specialisation) supports incremental design and re-use of already writ...
Heike Wehrheim
104
Voted
DASFAA
2008
IEEE
115views Database» more  DASFAA 2008»
15 years 7 months ago
An Optimized Two-Step Solution for Updating XML Views
View updating is a long standing difficult problem. Given a view defined over base data sources and a view update, there are several different updates over the base data sources,...
Ling Wang, Ming Jiang 0003, Elke A. Rundensteiner,...
72
Voted
SYNTHESE
2010
101views more  SYNTHESE 2010»
14 years 11 months ago
Bayesian probability
“Bayesian probability” here means the concept of probability used in Bayesian decision theory. It is usually identified with the agent’s degrees of belief but that interpret...
Patrick Maher
116
Voted
ICPR
2002
IEEE
15 years 5 months ago
Determining a Suitable Metric when Using Non-Negative Matrix Factorization
The Non-negative Matrix Factorization technique (NMF) has been recently proposed for dimensionality reduction. NMF is capable to produce a region- or partbased representation of o...
David Guillamet, Jordi Vitrià