Sciweavers

3330 search results - page 252 / 666
» software 2010
Sort
View
114
Voted
TSE
2010
110views more  TSE 2010»
14 years 11 months ago
Proofs from Tests
We present an algorithm Dash to check if a program P satisfies a safety property ϕ. The unique feature of the algorithm is that it uses only test generation operations, and nes ...
Nels E. Beckman, Aditya V. Nori, Sriram K. Rajaman...
111
Voted
GRC
2010
IEEE
14 years 10 months ago
A Comparative Study of Threshold-Based Feature Selection Techniques
Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality clas...
Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hu...
105
Voted
SAC
2010
ACM
15 years 7 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
ICASSP
2010
IEEE
15 years 29 days ago
High-resolution glyph-inspection based security system
: © High-Resolution Glyph-Inspection Based Security System Steven J. Simske, Guy Adams HP Laboratories HPL-2010-42 Image forensics, CMOS imaging, authentication, print parasitics,...
Steven J. Simske, Guy Adams
TOSEM
2010
159views more  TOSEM 2010»
14 years 11 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard