A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
CRIME ANALYSIS AND PREDICTION USING DATA MINING TECHNIQUES
2019
International Journal of Recent Trends in Engineering and Research
Our system can predict regions which have high probability for crime occurrence and can visualize crime prone areas. With the increasing advent of computerized systems. ...
This probabilistic trend is also displayed in form of graphs for easy understanding of the police department. ...
The crime sequence and the patterns which several criminals follow when committing a crime make it easy for analyzing the crime. ...
doi:10.23883/ijrter.conf.20190322.078.yi0nm
fatcat:3j2fag42xfe7bcacvhg5ddf2c4
Successive Duplicate Detection in Scalable Datasets in Cloud Database
2018
International Journal of Engineering & Technology
All exhibited clues create static requests for the examinations and miss the chance to powerfully modify the correlation arrange at runtime in light of transitional outcomes. ...
System Architecture
Figure: System Architecture The DFD is additionally called as air pocket graph. ...
doi:10.14419/ijet.v7i2.4.11167
fatcat:a5x535fmhncdnmbqryjupgvy4y
Prospects and challenges in R package development
2010
Computational statistics (Zeitschrift)
coupled development model, repositories should be able to verify that the provided packages meet certain formal quality criteria and "work": both relative to the development of the base R system as well as with ...
Figure 2 shows such a graph for the CRAN package clue (all graphs have been created with the help of package igraph, Csardi and Nepusz, 2006) . ...
Suppose vcd ∈ d(TIMP) (see Figure 1 ) provides a new function for visualizing categorical data in the package on R-Forge. ...
doi:10.1007/s00180-010-0205-5
fatcat:a2hmi2uyd5axtewjud6cz5itga
Boundary Value Exploration for Software Analysis
[article]
2020
arXiv
pre-print
Additionally, we propose two concrete BVE techniques based on information-theoretic distance functions: (i) an algorithm for boundary detection and (ii) the usage of software visualization to explore the ...
importance interacting with with the visualization. ...
An investigation in 3d can give clues that search may not capture otherwise. The plateau with the boundary can still be seen in the lower right corner (Figure 7, left) . ...
arXiv:2001.06652v1
fatcat:mqewmqnuq5bntc5gpwlv7gdkja
Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification
[article]
2022
arXiv
pre-print
Moreover, VisMal provides security engineers with a simple visualization approach to further validate its performance. ...
In this paper, we propose a visualized malware classification framework called VisMal, which provides highly efficient categorization with acceptable accuracy. ...
based on runtime behaviors [27] . ...
arXiv:2108.04314v3
fatcat:fuwtqsbw75e7ziortly2k4ncoy
The International Exascale Software Project roadmap
2011
The international journal of high performance computing applications
Engage and coordinate with the vendor community in cross-cutting efforts: To leverage resources and create a more capable software infrastructure for supporting exascale science, the IESP is committed ...
to engaging and coordinating with vendors across all of its other objectives. ...
For dynamic graph-based problems, data-directed execution using the graph structure to efficiently define the parallel program execution will require runtime support. ...
doi:10.1177/1094342010391989
fatcat:twdszcjfxraijpsdcdacvpp6vm
Feature location in source code: a taxonomy and survey
2011
Journal of Software: Evolution and Process
Each dimension has a number of distinct attributes associated with it. For a given dimension, a feature location technique may be associated with multiple attributes. ...
DIMENSIONS OF THE SURVEY The goal of this survey is to provide researchers and practitioners with a structured overview of existing research in the area of feature location. ...
The tool maps the lines of code that were changed during CVS commits with the CVS comments associated with those commits. ...
doi:10.1002/smr.567
fatcat:tz5smvpgtje6vohqitkhocd52e
Software challenges in extreme scale systems
2009
Journal of Physics, Conference Series
This has included the world's first true multi-core chip, EXECUBE, that in the early 1990s integrated 4 Mbits of DRAM with over 100K gates of logic to support a complete 8 way binary hypercube parallel ...
was one of the early works on what is now called parallel prefix, and applications of those results are still acknowledged as defining the fastest possible implementations of circuits such as adders with ...
Integration of incremental enhancements of Linux will be achieved by the runtime and compiler layers. ...
doi:10.1088/1742-6596/180/1/012045
fatcat:iukutry2dvbitfdh6ng7kgz564
Automatically documenting program changes
2010
Proceedings of the IEEE/ACM international conference on Automated software engineering - ASE '10
Source code modifications are often documented with log messages. ...
The documentation it produces describes the effect of a change on the runtime behavior of a program, including the conditions under which program behavior changes and what the new behavior is. ...
Finally, note that our algorithm runs on control flow graphs, and is suitable for use with common imperative languages. ...
doi:10.1145/1858996.1859005
dblp:conf/kbse/BuseW10
fatcat:ak32cwjtlje2po6ospcxprbv5i
Discovery of Potential Parallelism in Sequential Programs
2013
2013 42nd International Conference on Parallel Processing
A program is represented as a CU graph, in which vertexes are CUs and edges are data dependences. ...
Unfortunately, tools that identify parallelism during compilation are usually conservative due to the lack of runtime information, and tools relying on runtime information primarily suffer from high overhead ...
Nonetheless, several enhancement opportunities arise. ...
doi:10.1109/icpp.2013.119
dblp:conf/icpp/LiJW13
fatcat:6dc5s2ao4rhv7avxb4oai77hoi
Comparing text-based and dependence-based approaches for determining the origins of bugs
2013
Journal of Software: Evolution and Process
A number of potential improvements are explored in detail and serve to identify pragmatic strategies for combining the techniques along with relatively simple modifications. ...
Even after adopting these improvements there remain many challenges: large commits, unrelated changes and long periods between origins and fixes all reduce effectiveness. • The atomic construct is the ...
bug, or with no bug at all (taking the form of opportunistic refactorings or enhancements for example). • A bug report may contain details about more than one bug. • Developers may make more than one ...
doi:10.1002/smr.1619
fatcat:jcduhjfbbrhffmipgzkktkplre
Mining and Visualizing Research Networks Using the Artefact-Actor-Network Approach
[chapter]
2012
Computational Social Networks
Moreover, selected networks are visualized. Research Networks of the same type show similar descriptive measures while different types are not directly comparable to each other. ...
In order to deepen the model of AANs and its application to Research Networks, a relevant theoretical background as well as clues for a prototypical reference implementation are provided. ...
to the Graph Exchange XML Format 13 . ...
doi:10.1007/978-1-4471-4054-2_10
fatcat:s33f6frvrnfypoon2ccmsfsgry
Reowolf 1.0 Project Code and Documentation
[article]
2020
Zenodo
Figure 11 .20 visualizes this session before and after this optimization as a pair of component graphs. ...
This optimization is visualized in Figure 11 .30. ...
Concretely, these errors correspond with the semantics of PDL itself. For example, if a component is defined with two arguments with the same identifier. ...
doi:10.5281/zenodo.4160607
fatcat:ru22q2jfxfdqfk67wn4vfoiwxq
A Survey on Automated Log Analysis for Reliability Engineering
[article]
2021
arXiv
pre-print
In recent decades, software logs have become imperative in the reliability assurance mechanism of many software systems because they are often the only data available that record software runtime information ...
[35] proposed Desh to identify failure indicators in each node with enhanced training and classification for failure event log chain. ...
Graph Mining. ...
arXiv:2009.07237v2
fatcat:thbtfboglnglld5rr6s2gqhizi
Interactive record/replay for web application debugging
2013
Proceedings of the 26th annual ACM symposium on User interface software and technology - UIST '13
Finally, prior work does not consider how record/replay capabilities can interoperate with and enhance existing debugging tools like breakpoints and logging. ...
Developers can use Timelapse to browse, visualize, and seek within recorded program executions while simultaneously using familiar debugging tools such as breakpoints and logging. ...
We believe that when combined with on-demand replay, post mortem trace visualization and program understanding tools will become in vivo tools for understanding program behavior at runtime. ...
doi:10.1145/2501988.2502050
dblp:conf/uist/BurgBKE13
fatcat:f3s6knuy4zbsjpzzeevrbs66va
« Previous
Showing results 1 — 15 out of 357 results