Search
Now showing items 41-50 of 290
An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems (Supplementary Material)
(2015-02-02)
We analyze reported patches for three prior generate-and-validate patch generation systems (GenProg, RSRepair, and AE). Because of experimental error, the majority of the reported patches violate the basic principle behind ...
Automatic Program Repair with Condition Synthesis and Compound Mutations
(2015-02-12)
We present PCR, a new automatic patch generation system. PCR uses a new condition synthesis technique to efficiently discover logical expressions that generate desired control- flow transfer patterns. Presented with a set ...
Supplementary Materials for "A Survey of Corpora in Computational and Cognitive Narrative Science"
(2014-12-30)
This archive contains supplementary materials for the article titled "A Survey of Corpora in Computational and Cognitive Narrative Science" by Mark A. Finlayson, published in the journal *Sprache und Datenverarbeitung*. ...
Examining high level neural representations of cluttered scenes
(2010-07-29)
Humans and other primates can rapidly categorize objects even when they are embedded in complex visual scenes (Thorpe et al., 1996; Fabre-Thorpe et al., 1998). Studies by Serre et al., 2007 have shown that the ability of ...
Language and Compiler Support for Auto-Tuning Variable-Accuracy Algorithms
(2010-07-27)
Approximating ideal program outputs is a common technique for solving computationally difficult problems, for adhering to processing or timing constraints, and for performance optimization in situations where perfect ...
Characteristics of Small Social Networks
(2010-07-27)
Two dozen networks are analyzed using three parameters that attempt to capture important properties of social networks: leadership L, member bonding B, and diversity of expertise D. The first two of these parameters have ...
Power-Aware Computing with Dynamic Knobs
(2010-05-14)
We present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static configuration parameters into dynamic knobs that ...
iJam: Jamming Oneself for Secure Wireless Communication
(2010-06-07)
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that simply snoop on the wireless medium successfully defeat the security of even 802.11 networks using the most recent security ...
EM2: A Scalable Shared-Memory Multicore Architecture
(2010-06-12)
We introduce the Execution Migration Machine (EM2), a novel, scalable shared-memory architecture for large-scale multicores constrained by off-chip memory bandwidth. EM2 reduces cache miss rates, and consequently off-chip ...
SIFT Flow: Dense Correspondence across Scenes and its Applications
(2010-05-08)
While image alignment has been studied in different areas of computer vision for decades, aligning images depicting different scenes remains a challenging problem. Analogous to optical flow where an image is aligned to its ...