• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 32
Next 10 →

Declarative Visitors to Ease Fine-grained Source Code Mining with Full History on Billions of AST Nodes

by Robert Dyer, Hridesh Rajan, Tien N. Nguyen
"... Software repositories contain a vast wealth of information about software development. Mining these repositories has proven useful for detecting patterns in software development, testing hypotheses for new software engineering approaches, etc. Specifically, mining source code has yielded significant ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
the his-tory of the code due to both human and computational scalability issues. In this paper we address the substantial challenges of min-ing source code: a) at a very large scale; b) at a fine-grained level of detail; and c) with full history information. To address these challenges, we present domain

Representing code history with development environment events

by Martín Dias, Damien Cassou, Stéphane Ducasse - In International Workshop on Smalltalk Technologies , 2013
"... Modern development environments handle information about syntax trees for providing high-level code manipulation such as refactorings; nevertheless, they do not keep track of this information in a way that would simplify code sharing and change understanding. In most Smalltalk systems, source code m ..."
Abstract - Cited by 5 (4 self) - Add to MetaCart
modifications are immediately registered in a trans-action log often called a ChangeSet. Such mechanism has proven reliability, but it has several limitations. In this pa-per we analyse such limitations and describe scenarios and requirements for tracking fine-grained code history with a semantic representation

Author manuscript, published in "IWST-2013- 5th International Workshop on Smalltalk Technologies (2013)" Representing Code History with Development Environment Events

by Martín Dias, Damien Cassou, Stéphane Ducasse , 2013
"... Modern development environments handle information about syntax trees for providing high-level code manipulation such as refactorings; nevertheless, they do not keep track of this information in a way that would simplify code sharing and change understanding. In most Smalltalk systems, source code m ..."
Abstract - Add to MetaCart
modifications are immediately registered in a transaction log often called a ChangeSet. Such mechanism has proven reliability, but it has several limitations. In this paper we analyse such limitations and describe scenarios and requirements for tracking fine-grained code history with a semantic representation

Mining evolution data of a product family

by Harald Gall, Michael Fischer, Michael Fischer, Johann Oberleitner, Johann Oberleitner, Jacek Ratzinger, Jacek Ratzinger - SIGSOFT Softw. Eng , 2005
"... Diversification of software assets through evolving requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addressed the mining for data in software repositories of single products ranging from fine- to coarse grained analyses. But s ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
views of the system discovering and indicating evolutionary highlights. To process the large amount of data, we extended our previously developed approach for storing release history information to support the analysis of product families. In a case study we apply our approach on data from three

DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process

by Carlo Curino, Hyun Jin, Moon Alin Deutsch, Carlo Zaniolo, C. Curino (b, H. J. Moon, A. Deutsch, C. Zaniolo
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract - Add to MetaCart
Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy

Acknowledgements

by Alejandro Houspanossian, Facultad De Ciencias Exactas , 2006
"... First, I would like to thank to Dimka Karastoyanova and Mariano Cilia for all the fruitful discussions, their guidance and support through the course of this project. Thanks also to Prof. Alejandro Buchmann who sponsored my stay at Technische Universität Darmstadt during the spring of 2004. The spec ..."
Abstract - Add to MetaCart
First, I would like to thank to Dimka Karastoyanova and Mariano Cilia for all the fruitful discussions, their guidance and support through the course of this project. Thanks also to Prof. Alejandro Buchmann who sponsored my stay at Technische Universität Darmstadt during the spring of 2004. The special thanks go to my advisor, Mariano Cilia, who has made all this possible. Finally, I’d like to thank to my family for all these years of support.

3esis Supervisor Accepted by

by Audio-based Localisation, Benjamin Christopher Dalton, V. Michael, Benjamin Christopher Dalton , 2005
"... in partial ful2llment of the requirements for the degree of ..."
Abstract - Add to MetaCart
in partial ful2llment of the requirements for the degree of

List of Tables...........................

by Catherine Rose, Mills Olschanowsky, Catherine Rose, Mills Olschanowsky , 2011
"... by ..."
Abstract - Add to MetaCart
Abstract not found

doi:10.1155/2012/826702 Research Article Exploiting the Burstiness of Intermediate-Quality Wireless Links

by Muhammad Hamad Alizai, Olaf L, Klaus Wehrle
"... Copyright © 2012 Muhammad Hamad Alizai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We address the challenge of link estima ..."
Abstract - Add to MetaCart
Copyright © 2012 Muhammad Hamad Alizai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We address the challenge of link estimation and routing over highly dynamic links, thats is, bursty links that rapidly shift between reliable and unreliable periods of transmissions. Based on significant empirical evidence of over 100,000 transmissions over each link in 802.15.4 and 802.11 testbeds, we propose two metrics, expected future transmissions (EFT) and MAC3, for runtime estimation of bursty wireless links.We introduce a bursty link estimator (BLE) that based on these twometrics, accurately estimates bursty links in the network rendering them available for data transmissions. Finally, we present bursty routing extensions (BRE): an adaptive routing strategy that uses BLE for forwarding packets over bursty links if they offer better routing progress than long-term stable links. Our evaluation, comprising experimental data from widely used IEEE 802.15.4-based testbeds, reveals an average of 19 % and a maximum of 42 % reduction in the number of transmissions when routing over long-range bursty links typically ignored by routing protocols. Additionally, we show that both BLE and BRE are not tied to any specific routing protocol and integrate seamlessly with existing routing protocols and link estimators. 1.

Thesis Advisor Accepted by.......Gakenhimer..

by Gregory A. Rossel, Fiichael J. Shiffer, Ralph Gakenheimer, Gregory A. Rossel
"... ussRaNIte ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 32
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University