Filters








357 Hits in 3.0 sec

CRIME ANALYSIS AND PREDICTION USING DATA MINING TECHNIQUES

Rajkumar S, Sakkarai Pandi.M, Soundarya Jagan.J, Varnikasree P
2019 International Journal of Recent Trends in Engineering and Research  
Our system can predict regions which have high probability for crime occurrence and can visualize crime prone areas. With the increasing advent of computerized systems.  ...  This probabilistic trend is also displayed in form of graphs for easy understanding of the police department.  ...  The crime sequence and the patterns which several criminals follow when committing a crime make it easy for analyzing the crime.  ... 
doi:10.23883/ijrter.conf.20190322.078.yi0nm fatcat:3j2fag42xfe7bcacvhg5ddf2c4

Successive Duplicate Detection in Scalable Datasets in Cloud Database

N Rajkumar, K Kishore Kumar, J Vivek
2018 International Journal of Engineering & Technology  
All exhibited clues create static requests for the examinations and miss the chance to powerfully modify the correlation arrange at runtime in light of transitional outcomes.  ...  System Architecture Figure: System Architecture The DFD is additionally called as air pocket graph.  ... 
doi:10.14419/ijet.v7i2.4.11167 fatcat:a5x535fmhncdnmbqryjupgvy4y

Prospects and challenges in R package development

Stefan Theußl, Uwe Ligges, Kurt Hornik
2010 Computational statistics (Zeitschrift)  
coupled development model, repositories should be able to verify that the provided packages meet certain formal quality criteria and "work": both relative to the development of the base R system as well as with  ...  Figure 2 shows such a graph for the CRAN package clue (all graphs have been created with the help of package igraph, Csardi and Nepusz, 2006) .  ...  Suppose vcd ∈ d(TIMP) (see Figure 1 ) provides a new function for visualizing categorical data in the package on R-Forge.  ... 
doi:10.1007/s00180-010-0205-5 fatcat:a2hmi2uyd5axtewjud6cz5itga

Boundary Value Exploration for Software Analysis [article]

Felix Dobslaw and Francisco Gomes de Oliveira Neto and Robert Feldt
2020 arXiv   pre-print
Additionally, we propose two concrete BVE techniques based on information-theoretic distance functions: (i) an algorithm for boundary detection and (ii) the usage of software visualization to explore the  ...  importance interacting with with the visualization.  ...  An investigation in 3d can give clues that search may not capture otherwise. The plateau with the boundary can still be seen in the lower right corner (Figure 7, left) .  ... 
arXiv:2001.06652v1 fatcat:mqewmqnuq5bntc5gpwlv7gdkja

Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification [article]

Fangtian Zhong, Zekai Chen, Minghui Xu, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng
2022 arXiv   pre-print
Moreover, VisMal provides security engineers with a simple visualization approach to further validate its performance.  ...  In this paper, we propose a visualized malware classification framework called VisMal, which provides highly efficient categorization with acceptable accuracy.  ...  based on runtime behaviors [27] .  ... 
arXiv:2108.04314v3 fatcat:fuwtqsbw75e7ziortly2k4ncoy

The International Exascale Software Project roadmap

Jack Dongarra, Pete Beckman, Terry Moore, Patrick Aerts, Giovanni Aloisio, Jean-Claude Andre, David Barkai, Jean-Yves Berthou, Taisuke Boku, Bertrand Braunschweig, Franck Cappello, Barbara Chapman (+53 others)
2011 The international journal of high performance computing applications  
Engage and coordinate with the vendor community in cross-cutting efforts: To leverage resources and create a more capable software infrastructure for supporting exascale science, the IESP is committed  ...  to engaging and coordinating with vendors across all of its other objectives.  ...  For dynamic graph-based problems, data-directed execution using the graph structure to efficiently define the parallel program execution will require runtime support.  ... 
doi:10.1177/1094342010391989 fatcat:twdszcjfxraijpsdcdacvpp6vm

Feature location in source code: a taxonomy and survey

Bogdan Dit, Meghan Revelle, Malcom Gethers, Denys Poshyvanyk
2011 Journal of Software: Evolution and Process  
Each dimension has a number of distinct attributes associated with it. For a given dimension, a feature location technique may be associated with multiple attributes.  ...  DIMENSIONS OF THE SURVEY The goal of this survey is to provide researchers and practitioners with a structured overview of existing research in the area of feature location.  ...  The tool maps the lines of code that were changed during CVS commits with the CVS comments associated with those commits.  ... 
doi:10.1002/smr.567 fatcat:tz5smvpgtje6vohqitkhocd52e

Software challenges in extreme scale systems

Vivek Sarkar, William Harrod, Allan E Snavely
2009 Journal of Physics, Conference Series  
This has included the world's first true multi-core chip, EXECUBE, that in the early 1990s integrated 4 Mbits of DRAM with over 100K gates of logic to support a complete 8 way binary hypercube parallel  ...  was one of the early works on what is now called parallel prefix, and applications of those results are still acknowledged as defining the fastest possible implementations of circuits such as adders with  ...  Integration of incremental enhancements of Linux will be achieved by the runtime and compiler layers.  ... 
doi:10.1088/1742-6596/180/1/012045 fatcat:iukutry2dvbitfdh6ng7kgz564

Automatically documenting program changes

Raymond P.L. Buse, Westley R. Weimer
2010 Proceedings of the IEEE/ACM international conference on Automated software engineering - ASE '10  
Source code modifications are often documented with log messages.  ...  The documentation it produces describes the effect of a change on the runtime behavior of a program, including the conditions under which program behavior changes and what the new behavior is.  ...  Finally, note that our algorithm runs on control flow graphs, and is suitable for use with common imperative languages.  ... 
doi:10.1145/1858996.1859005 dblp:conf/kbse/BuseW10 fatcat:ak32cwjtlje2po6ospcxprbv5i

Discovery of Potential Parallelism in Sequential Programs

Zhen Li, Ali Jannesari, Felix Wolf
2013 2013 42nd International Conference on Parallel Processing  
A program is represented as a CU graph, in which vertexes are CUs and edges are data dependences.  ...  Unfortunately, tools that identify parallelism during compilation are usually conservative due to the lack of runtime information, and tools relying on runtime information primarily suffer from high overhead  ...  Nonetheless, several enhancement opportunities arise.  ... 
doi:10.1109/icpp.2013.119 dblp:conf/icpp/LiJW13 fatcat:6dc5s2ao4rhv7avxb4oai77hoi

Comparing text-based and dependence-based approaches for determining the origins of bugs

Steven Davies, Marc Roper, Murray Wood
2013 Journal of Software: Evolution and Process  
A number of potential improvements are explored in detail and serve to identify pragmatic strategies for combining the techniques along with relatively simple modifications.  ...  Even after adopting these improvements there remain many challenges: large commits, unrelated changes and long periods between origins and fixes all reduce effectiveness. • The atomic construct is the  ...  bug, or with no bug at all (taking the form of opportunistic refactorings or enhancements for example). • A bug report may contain details about more than one bug. • Developers may make more than one  ... 
doi:10.1002/smr.1619 fatcat:jcduhjfbbrhffmipgzkktkplre

Mining and Visualizing Research Networks Using the Artefact-Actor-Network Approach [chapter]

Wolfgang Reinhardt, Adrian Wilke, Matthias Moi, Hendrik Drachsler, Peter Sloep
2012 Computational Social Networks  
Moreover, selected networks are visualized. Research Networks of the same type show similar descriptive measures while different types are not directly comparable to each other.  ...  In order to deepen the model of AANs and its application to Research Networks, a relevant theoretical background as well as clues for a prototypical reference implementation are provided.  ...  to the Graph Exchange XML Format 13 .  ... 
doi:10.1007/978-1-4471-4054-2_10 fatcat:s33f6frvrnfypoon2ccmsfsgry

Reowolf 1.0 Project Code and Documentation [article]

Christopher A. Esterhuyse, Hans-Dieter A. Hiep
2020 Zenodo  
Figure 11 .20 visualizes this session before and after this optimization as a pair of component graphs.  ...  This optimization is visualized in Figure 11 .30.  ...  Concretely, these errors correspond with the semantics of PDL itself. For example, if a component is defined with two arguments with the same identifier.  ... 
doi:10.5281/zenodo.4160607 fatcat:ru22q2jfxfdqfk67wn4vfoiwxq

A Survey on Automated Log Analysis for Reliability Engineering [article]

Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, Michael R. Lyu
2021 arXiv   pre-print
In recent decades, software logs have become imperative in the reliability assurance mechanism of many software systems because they are often the only data available that record software runtime information  ...  [35] proposed Desh to identify failure indicators in each node with enhanced training and classification for failure event log chain.  ...  Graph Mining.  ... 
arXiv:2009.07237v2 fatcat:thbtfboglnglld5rr6s2gqhizi

Interactive record/replay for web application debugging

Brian Burg, Richard Bailey, Andrew J. Ko, Michael D. Ernst
2013 Proceedings of the 26th annual ACM symposium on User interface software and technology - UIST '13  
Finally, prior work does not consider how record/replay capabilities can interoperate with and enhance existing debugging tools like breakpoints and logging.  ...  Developers can use Timelapse to browse, visualize, and seek within recorded program executions while simultaneously using familiar debugging tools such as breakpoints and logging.  ...  We believe that when combined with on-demand replay, post mortem trace visualization and program understanding tools will become in vivo tools for understanding program behavior at runtime.  ... 
doi:10.1145/2501988.2502050 dblp:conf/uist/BurgBKE13 fatcat:f3s6knuy4zbsjpzzeevrbs66va
« Previous Showing results 1 — 15 out of 357 results