Search
Skip to Search Results- 414Computing Science, Department of
- 315Computing Science, Department of/Technical Reports (Computing Science)
- 71Computing Science, Department of/Conference Papers (Computing Science)
- 23Computing Science, Department of/Journal Articles (Computing Science)
- 4Computing Science, Department of/Research Data and Materials (Computing Science)
- 1Computing Science, Department of/Presentations (Computing Science)
- 95Hindle, Abram
- 28Szafron, Duane
- 21Schaeffer, Jonathan
- 19Zaiane, Osmar
- 15Ozsu, M. Tamer
- 14Nascimento, Mario
- 29Database Systems
- 18Artificial Intelligence
- 13Computer Games
- 9Computer Graphics
- 9Databases
- 9Software Engineering
-
2015
Aggarwal, K., Rutgers, T., Timbers, F., Hindle, Abram, Greiner, R., Stroulia, E.
In previous work by Alipour et al., a methodology was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords....
-
2011
Godfrey, M., Davis, J., German, D., Hindle, Abram
Software clone detection has made substantial progress in the last 15 years, and software clone analysis is starting to provide real insight into how and why code clones are born, evolve, and sometimes die. In this position paper, we make the case that there is a more general problem lurking in...
-
1989
Marsland, Tony, Breitkreutz, T., Sutphen, Steven
Technical report TR89-11. This paper explains how to write Network Multiprocessor Package (NMP) applications. The technical report NMP--A Network Multi-processor [TR88-22] contains an overview of NMP, implementation details, more advanced usage information, and instructions for installing the...
-
2001
Technical report TR01-11. With the increasing proliferation of computing devices and platforms, it has become increasingly important for organizations to make their existing software systems accessible to new environments. However, almost all the proposed solutions for this problem focus either...
-
Differential Evaluation of Continual Queries
1995
Zhou, Tong, Pu, Calton, Barga, Roger, Liu, Ling
Technical report TR95-17. Information Superhighway environments such as the Internet have brough us ready access to large amounts of information. However, Internet data is notoriously unorganized and autonomously managed in a distributed fashion. Large scale information monitoring in the...
-
2002
Zaiane, Osmar, Nascimento, Mario, Oliveira, Stanley
Technical report TR02-01. Research in information hiding has grown explosively. A large number of techniques have been proposed to discourage copyright infringement, tampering and unauthorized distribution of digital media (e.g. video, audio, and images). In this paper, we provide an overview of...
-
2004
Technical report TR04-22. Model selection problem in Bayesian belief network (BN) structure learning is a classicial problem in the BN literature. To do model selection in BN structure learning, we need a evaluation score and a searching procedure. The generative criteria, AIC, BIC and BDe, are...
-
2008
Nikolaidis, Ioanis, Nascimento, Mario, Malhotra, Baljeet
Technical report TR08-02. We consider the problem of vehicle classification using acoustic signals captured within a sensor network. The sensors perform collaborative decision and/or data fusion in a distributed and energy efficient manner. We present a distributed cluster-based algorithm,...