Sciweavers

1687 search results - page 167 / 338
» Which pointer analysis should I use
Sort
View
WCRE
2010
IEEE
15 years 2 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...
ATAL
2006
Springer
15 years 8 months ago
Agent-based modeling of human education data
Agent-based simulation is increasingly used to analyze the performance of complex systems. There are two main ways agentbased models are built -- from equation-based models and di...
Yuqing Tang, Simon Parsons, Elizabeth Sklar
ATAL
2010
Springer
15 years 5 months ago
Merging example plans into generalized plans for non-deterministic environments
We present a new approach for finding generalized contingent plans with loops and branches in situations where there is uncertainty in state properties and object quantities, but ...
Siddharth Srivastava, Neil Immerman, Shlomo Zilber...
NECO
1998
116views more  NECO 1998»
15 years 4 months ago
GTM: The Generative Topographic Mapping
Latent variable models represent the probability density of data in a space of several dimensions in terms of a smaller number of latent, or hidden, variables. A familiar example ...
Christopher M. Bishop, Markus Svensén, Chri...
EJIS
2010
52views more  EJIS 2010»
15 years 4 months ago
Same technology, different outcome? Reinterpreting Barley's Technology as an Occasion for Structuring
In the last few decades, several studies have found the same technology implemented in highly similar organizational settings to be associated with very different consequences for...
Starling David Hunter III