Search
Skip to Search Results- 414Computing Science, Department of
- 315Computing Science, Department of/Technical Reports (Computing Science)
- 71Computing Science, Department of/Conference Papers (Computing Science)
- 23Computing Science, Department of/Journal Articles (Computing Science)
- 4Computing Science, Department of/Research Data and Materials (Computing Science)
- 1Computing Science, Department of/Presentations (Computing Science)
- 95Hindle, Abram
- 28Szafron, Duane
- 21Schaeffer, Jonathan
- 19Zaiane, Osmar
- 15Ozsu, M. Tamer
- 14Nascimento, Mario
- 29Database Systems
- 18Artificial Intelligence
- 13Computer Games
- 9Computer Graphics
- 9Databases
- 9Software Engineering
-
2013
Tsantalis, N., Guana, V., Stroulia, E., Hindle, Abram
In this paper we present an empirical study on the refactoring activity in three well-known projects. We have studied five research questions that explore the different types of refactorings applied to different types of sources, the individual contribution of team members on refactoring...
-
1994
Schaeffer, Jonathan, Pijls, Wim, de Bruin, Arie, Plaat, Aske
Technical report TR94-18. This paper introduces a new paradigm for minimax game-tree search algorithms. MT is a memory-enhanced version of Pearl's Test procedure. By changing the way MT is called, a number of best-first game-tree search algorithms can be simply and elegantly constructed...
-
A Note on "How to Write a Proof"
1996
Trybulec, Andrzej, Rudnicki, Piotr
Technical report TR96-08. We believe that mechanical checking of real-life proofs can become practical and therefore we use Mizar---a proof checking system for proofs written in a style of traditional mathematics. In the beginning of 1994 we came across a copy of L. Lamport's paper in which \"a...
-
2005
Technical report TR05-21. Non-Newtonian fluids exist in nature, such as blood and egg white, and in man-made products, such as toothpaste and ketchup. They exhibit more interesting and complex behaviors than traditional Newtonian fluid such as water. In this paper, we propose a new particle-based...
-
2008
Technical report TR08-04. There are many network intrusion detection and prevention tools available to the network administrator of today, but Snort has become an enterprise standard due to its open source nature and also due to the fact that there are many open source operating systems which...
-
2009
Salavatipour, Mohammad, Pirwani, Imran
Technical report TR09-06. We consider the problem of partitioning the set of vertices of a given unit disk graph (UDG) into a minimum number of cliques. The problem is NP-hard and various constant factor approximations are known, with the current best ratio of 3. Our main result is a polynomial...
-
A Robust CBIR Approach Using Local Color Histograms
2001
Technical report TR01-13. Global color histograms are well-known as a simple and often way to perform color-based image retrieval. However, it lacks spatial information about the image colors. The use of a grid of cells superimposed on the images and the use of loca l color histograms for each...
-
2011
Posnett, D., Hindle, Abram, Devanbu, P.
Software readability is a property that influences how easily a given piece of code can be read and understood. Since readability can affect maintainability, quality, etc., programmers are very concerned about the readability of code. If automatic readability checkers could be built, they could...
-
A Stable Algorithm for Multi-dimensional Padé Systems and the Inversion of Generalized Sylvester Matrices
Download1994
Jones, Anthony, Cabay, Stan, Labahn, George
Technical report TR94-07. For k+1 power series a0(z), ..., ak(z), we present a new iterative, look-ahead algorithm for numerically computing Pade'-Hermite systems and simultaneous Pade' systems along a diagonal of the associated Pade' tables. The algorithm computes the systems at all those...