• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 929
Next 10 →

From Data Mining to Knowledge Discovery in Databases.

by Usama Fayyad , Gregory Piatetsky-Shapiro , Padhraic Smyth - AI Magazine, , 1996
"... ■ Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. What is all the excitement about? This article provides an overview of this emerging field, clarifying how data mining and knowledge discovery in database ..."
Abstract - Cited by 538 (0 self) - Add to MetaCart
of digital data. These theories and tools are the subject of the emerging field of knowledge discovery in databases (KDD). At an abstract level, the KDD field is concerned with the development of methods and techniques for making sense of data. The basic problem addressed by the KDD process is one of mapping

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
of instructions. We then present detailed experiments with several Windows applications. Notably, without any format-specific knowledge, SAGE detects the MS07-017 ANI vulnerability, which was missed by extensive blackbox fuzzing and static analysis tools. Furthermore, while still in an early stage of development

Small group design meetings: An analysis of collaboration

by Gary M. Olson, Judith S. Olson, Mark R. Carter, Marianne Storrbsten - Human Computer Interaction , 1992
"... The development of schemes to support group work, whether behavioral methods or new technologies like groupware, should be based on detailed knowledge about how groups work, what they do well, and what they have trouble with. Such data can be used to suggest what kinds of tools people might need as ..."
Abstract - Cited by 119 (14 self) - Add to MetaCart
The development of schemes to support group work, whether behavioral methods or new technologies like groupware, should be based on detailed knowledge about how groups work, what they do well, and what they have trouble with. Such data can be used to suggest what kinds of tools people might need

Employee Engagement and Individual Differences: A Study in Indian Context

by Naval Garg , 2014
"... ABSTRACT: The employee engagement has emerged as a pivotal business driver for organizational success. High level of engagement in domestic and global firms is supposed to have multiple enriching effects on an organization. Studies have highlighted the importance of both organizational and individu ..."
Abstract - Add to MetaCart
and mechanisms to utilize diversity of work force have also been discussed. Further paper provides in depth analysis of eight constructs of employee engagement through applying suitable statistical tools. Individual characteristics based difference has also been studied for these eight constructs

PARSEWeb: A programmer assistant for reusing open source code on the web

by Suresh Thummalapenta - Source Code on the Web”, ASE 2007 , 2007
"... Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the programmers know what type of object that they need, but do not know how to get that object with a specific method sequen ..."
Abstract - Cited by 124 (18 self) - Add to MetaCart
Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the programmers know what type of object that they need, but do not know how to get that object with a specific method

How developers use data race detection tools

by Caitlin Sadowski, Jaeheon Yi - In Evaluation and Usability of Programming Languages and Tools , 2014
"... Developers need help with multithreaded programming. We investigate how two program analysis tools are used by de-velopers at Google: THREADSAFETY, an annotation-based static data race analysis, and TSAN, a dynamic data race de-tector. The data was collected by interviewing seven veteran industry de ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Developers need help with multithreaded programming. We investigate how two program analysis tools are used by de-velopers at Google: THREADSAFETY, an annotation-based static data race analysis, and TSAN, a dynamic data race de-tector. The data was collected by interviewing seven veteran industry

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
focus on how each measure captures a slightly different aspect of a VC's economic role in the network. 3 See Wasserman and Faust (1997) for a detailed review of network analysis methods. 4 For tractability, the graph excludes biotech-focused VC firms that have no syndication relationships during

Region-Based Shape Analysis with Tracked Locations

by Brian Hackett, Radu Rugina - POPL '05 , 2005
"... This paper proposes a novel approach to shape analysis: using local reasoning about individual heap locations instead of global reasoning about entire heap abstractions. We present an inter-procedural shape analysis algorithm for languages with destructive updates. The key feature is a novel memory ..."
Abstract - Cited by 100 (1 self) - Add to MetaCart
that the analysis can be used to enable the static detection of memory errors in programs with explicit deallocation. We have built a prototype tool that detects memory leaks and accesses through dangling pointers in C programs. The experiments indicate that the analysis is sufficiently precise to detect errors

Automated verification of selected equivalences for security protocols

by Bruno Blanchet, et al. - IN 20TH IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS’05 , 2005
"... In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. We focus on proving equivalences P ≈ Q in which P and Q are two processes that differ only in the choice of some terms. Th ..."
Abstract - Cited by 104 (12 self) - Add to MetaCart
. These equivalences arise often in applications. We show how to treat them as predicates on the behaviors of a process that represents P and Q at the same time. We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif.

Context capture in software development

by Bruno Antunes, Francisco Correia, Paulo Gomes - in 3d Artificial Intelligence Techniques in Software Engineering Workshop , 2010
"... Abstract. The context of a software developer is something hard to define and capture, as it represents a complex network of elements across different dimensions that are not limited to the work developed on an IDE. We propose the definition of a software developer context model that takes into acco ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
project management tools. The extraction, analysis and availability of this context information can be used to enrich the work environment of developers with additional knowledge to support their work.
Next 10 →
Results 1 - 10 of 929
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University