Filters








2,126 Hits in 7.8 sec

Predicting Performance of Software Configurations: There is no Silver Bullet [article]

Alexander Grebhahn University of Passau, Germany, Saarland University, Germany)
2019 arXiv   pre-print
Moreover, as the prediction accuracy strongly depends on the subject system, there is no combination of a learning technique and sampling strategy that is optimal in all cases, considering the tradeoff  ...  In the literature, there is a large number of machine-learning techniques and sampling strategies to select from. It is unclear, though, to what extent they affect prediction accuracy.  ...  ACKNOWLEDGMENTS This work is supported by the German Research Foundation (DFG), as part of the Priority Programme 1648 "Software for Exascale Computing", under the contract AP 206/7.  ... 
arXiv:1911.12643v1 fatcat:skc7ia4gojaetla4ltclmixzqm

What is Biomedia?

Eugene Thacker
2003 Configurations  
An example within the field of bioinformatics is genetic analysis performed using software tools.  ...  This "silver bullet" approach was pioneered by French Anderson, who treated a young girl with a rare single gene mutation disorder (ADA) with this type of gene See Claude Shannon and Warren Eugene Thacker  ... 
doi:10.1353/con.2004.0014 fatcat:b6evmh4mqzc4nloa6erszi6lxe

Query-based configuration of text retrieval solutions for software engineering tasks

Laura Moreno, Gabriele Bavota, Sonia Haiduc, Massimiliano Di Penta, Rocco Oliveto, Barbara Russo, Andrian Marcus
2015 Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015  
We found that quest is able to recommend one of the top three TR configurations for a query with a 69% accuracy, on average.  ...  Text Retrieval (TR) approaches have been used to leverage the textual information contained in software artifacts to address a multitude of software engineering (SE) tasks.  ...  Based on all existing work, we argue that there is no "silver bullet" TR configuration that can work equally well for all queries formulated in the context of a SE task and a given software corpus.  ... 
doi:10.1145/2786805.2786859 dblp:conf/sigsoft/MorenoBHPORM15 fatcat:tdzrbjah2bd3nhis3f22zdorbi

Observations on versioning of off-the-shelf components in industrial projects (short paper)

Reidar Conradi, Jingyue Li
2005 Proceedings of the 12th international workshop on Software configuration management - SCM '05  
The perspective is that of a software architect or system integrator, not a developer or maintainer of such components.  ...  The study object is a completed development project using one or several OTS components. This paper reports on the versioning aspects of OTS components in such projects.  ...  Introduction Software reuse in the form of component-based software development (CBSD) has long been proposed as a silver bullet.  ... 
doi:10.1145/1109128.1109131 dblp:conf/scm/ConradiL05 fatcat:3u7ckli27jarrjuqxh7zhs7x6u

MEASURED EDUCATION: SENSING, CONFIGURING AND INTERVENING WITH ADVANCED MEDIA

Kevin Witzenberger, Kalervo Gulson, Sam Sellar, Ben Williamson, Elizabeth De Freitas
2020 Selected Papers of Internet Research, SPIR  
The panel shows how the idea of measurable and re-configurable bodies of students is being performed and stabilized through trade shows and academic conferences; it moves towards a critical analysis of  ...  What connects these papers is more than the spaces, ideas and practices that surround education.  ...  than understanding a situation as problematic that requires a single solution, often conceptualized as a 'silver bullet' in education policy (Webb & Gulson, 2015) .  ... 
doi:10.5210/spir.v2020i0.11153 fatcat:bpbw3orzcvhfpj437rq6fhzkba

A declarative language approach to device configuration

Adrian Schüpbach, Andrew Baumann, Timothy Roscoe, Simon Peter
2011 Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '11  
C remains the language of choice for hardware programming (device drivers, bus configuration, etc.): it is fast, allows low-level access, and is trusted by OS developers.  ...  We show that the approach is tractable, and can successfully configure a wide range of PCs with competitive runtime cost.  ...  Constraint satisfaction is no silver bullet: A hardware configuration problem like PCI, with all its special cases, is very natural to express as a constraint satisfaction problem.  ... 
doi:10.1145/1950365.1950382 dblp:conf/asplos/SchupbachBRP11 fatcat:42ufbch73jfftanybm6jvrnoui

A declarative language approach to device configuration

Adrian Schüpbach, Andrew Baumann, Timothy Roscoe, Simon Peter
2012 SIGPLAN notices  
C remains the language of choice for hardware programming (device drivers, bus configuration, etc.): it is fast, allows low-level access, and is trusted by OS developers.  ...  We show that the approach is tractable, and can successfully configure a wide range of PCs with competitive runtime cost.  ...  Constraint satisfaction is no silver bullet: A hardware configuration problem like PCI, with all its special cases, is very natural to express as a constraint satisfaction problem.  ... 
doi:10.1145/2248487.1950382 fatcat:xlpldcjizjerlnxm3crwv4zbom

A declarative language approach to device configuration

Adrian Schüpbach, Andrew Baumann, Timothy Roscoe, Simon Peter
2011 SIGPLAN notices  
C remains the language of choice for hardware programming (device drivers, bus configuration, etc.): it is fast, allows low-level access, and is trusted by OS developers.  ...  We show that the approach is tractable, and can successfully configure a wide range of PCs with competitive runtime cost.  ...  Constraint satisfaction is no silver bullet: A hardware configuration problem like PCI, with all its special cases, is very natural to express as a constraint satisfaction problem.  ... 
doi:10.1145/1961296.1950382 fatcat:wstg7quxxvcbnojd4ud5sx4nbm

A Declarative Language Approach to Device Configuration

Adrian Schüpbach, Andrew Baumann, Timothy Roscoe, Simon Peter
2012 ACM Transactions on Computer Systems  
C remains the language of choice for hardware programming (device drivers, bus configuration, etc.): it is fast, allows low-level access, and is trusted by OS developers.  ...  We show that the approach is tractable, and can successfully configure a wide range of PCs with competitive runtime cost.  ...  Constraint satisfaction is no silver bullet: A hardware configuration problem like PCI, with all its special cases, is very natural to express as a constraint satisfaction problem.  ... 
doi:10.1145/2110356.2110361 fatcat:ypkbezxflnbdhdhjgsvlenj2ba

A declarative language approach to device configuration

Adrian Schüpbach, Andrew Baumann, Timothy Roscoe, Simon Peter
2011 SIGARCH Computer Architecture News  
C remains the language of choice for hardware programming (device drivers, bus configuration, etc.): it is fast, allows low-level access, and is trusted by OS developers.  ...  We show that the approach is tractable, and can successfully configure a wide range of PCs with competitive runtime cost.  ...  Constraint satisfaction is no silver bullet: A hardware configuration problem like PCI, with all its special cases, is very natural to express as a constraint satisfaction problem.  ... 
doi:10.1145/1961295.1950382 fatcat:aicopwqlhzcvfn44spdyjsqb6a

Configuring and Assembling Information Retrieval Based Solutions for Software Engineering Tasks

Bogdan Dit
2016 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
One of the ways to exploit this information in order to support various software engineering (SE) tasks (e.g., concept location, traceability link recovery, change impact analysis, etc.) is to use Information  ...  This dissertation proposes the use of Genetic Algorithms (GAs) to automatically configure and assemble an IR process to support software engineering tasks.  ...  We acknowledge the fact that there is no "silver bullet" configuration for a search algorithm that would work well on all types of optimization problems, as stated by the no free lunch theorem [185] .  ... 
doi:10.1109/icsme.2016.85 dblp:conf/icsm/Dit16 fatcat:bre7b5b4dvfpnjktes5zau7iqm

Provably Secure Networks: Methodology and Toolset for Configuration Management [article]

Cornelius Diekmann
2017 arXiv   pre-print
Our first tool guides the process of designing networks from scratch. Our second tool facilitates the analysis of existing iptables configurations. Combined, the two form a powerful toolset.  ...  Network administration is an inherently complex task, in particular with regard to security.  ...  Acknowledgements This thesis would not have been possible without the support of many people.  ... 
arXiv:1708.08228v1 fatcat:ljgwja2k6jgunl5g45jnptqx5m

Do we put all eggs in one basket? A polynomial regression study of digital technology configuration strategies

Darshana Sedera, Sachithra Lokuge
2019 International Conference on Information Systems  
performance.  ...  for enhancing firm performance.  ...  To-date there are no specific digital technology configuration strategies presented in IS literature.  ... 
dblp:conf/icis/SederaL19 fatcat:5j7s7rzksrhfno2v7i5w6jddgm

A discipline of software architecture

Peter J. Denning, Pamela A. Dargan
1994 Interactions  
Action-centered design is proposed as the means to build software architecture by joining the two.  ...  Neither software engineering nor software design qualifies as a discipline, but software architecture might.  ...  There are lots of other examples of alleged 'silver bullets' ... Obviously none of these purported 'silver bullets' served in that role, or you wouldn't need to ask the question."  ... 
doi:10.1145/174800.174807 fatcat:o5gll2eq25eqjf3eas4bck4quu

Machine Learning for Cyber Security using Big Data Analytics

R. Vijaya Lakshmi
2019 Zenodo  
Machine Learning is an Approach to AI that uses a system that is capable of learning from experience.  ...  It is intended not only for AI goals (e.g., copying human behavior) but it can also reduce the efforts and/or time spent for both simple and difficult tasks like stock price prediction.  ...  CONCLUSION There are more areas left. I have outlined the basics. On the one hand, machine learning is definitely not a silver-bullet solution if we want to protect our systems.  ... 
doi:10.5281/zenodo.3362228 fatcat:ehzzbba5l5gbjaeuj7evqymxgq
« Previous Showing results 1 — 15 out of 2,126 results