نتایج جستجو برای: identifying code

تعداد نتایج: 330700  

2004
Iiro Honkala Mark G. Karpovsky Lev B. Levitin

A walk c1, c2, . . . , cM in an undirected graph G = (V, E) is called a dynamic identifying code, if all the sets I(v) = {u ∈ C : d(u, v) ≤ 1} for v ∈ V are nonempty and no two of them are the same set. Here d(u, v) denotes the number of edges on any shortest path from u to v, and C = {c1, c2, . . . , cM}. We consider dynamic identifying codes in square grids, triangular grids, hexagonal meshes...

Journal: :Electr. J. Comb. 2002
Irène Charon Olivier Hudry Antoine Lobstein

Let G = (V,E) be a connected undirected graph and S a subset of vertices. If for all vertices v ∈ V , the sets Br(v) ∩ S are all nonempty and different, where Br(v) denotes the set of all points within distance r from v, then we call S an r-identifying code. We give constructive upper bounds on the best possible density of r-identifying codes in four infinite regular graphs, for small values of r.

Journal: :Softwaretechnik-Trends 2014
Jan Jelschen Andreas Winter

Many software systems contain usused code. While unused code is an unnecessary burden for maintenance, it is often unclear which parts of a modern software system can actually be removed. We present a semi-automatic, iterative, language-independent approach to identify unused classes in large objectoriented systems. It combines static and runtime information about an application and aids develo...

2015
Neetu Rani Jyoti Chaudhary

Mutation Testing is white box testing technique that analyze the code under different values, bounds and constraints. It also analyzes the data values associated to different operators and evaluates their significance over the code. Further this operator based analysis helps in identifying the scope and limitations along with the relevancy, robustness and effectiveness of code. Mutation testing...

2016
Mistral Contrastin Matthew Danish Dominic Orchard Andrew Rice

Lightweight specifications support software maintainability by providing a way to verify that any changes to a code base preserve certain program properties. We give two examples of lightweight specifications for numerical code: units-of-measure types which specify the physical units of numerical quantities in a program; and stencil specifications which describe the pattern of data access used ...

Journal: :Bioinformatics 2018
Ho Jang Hyunju Lee

Summary Whole-exome sequencing (WES) data have been used for identifying copy number aberrations in cancer cells. Nonetheless, the use of WES is still challenging for identification of focal aberrant regions in multiple samples that may contain cancer driver genes. In this study, we developed a wavelet-based method for identifying focal genomic aberrant regions in the WES data from cancer cells...

2017
Courtney Napoles Joel R. Tetreault Aasish Pappu Enrica Rosato Brian Provenzale

This work presents a dataset and annotation scheme for the new task of identifying “good” conversations that occur online, which we call ERICs: Engaging, Respectful, and/or Informative Conversations. We develop a taxonomy to reflect features of entire threads and individual comments which we believe contribute to identifying ERICs; code a novel dataset of Yahoo News comment threads (2.4k thread...

2011
Andrew Butterfield

The key issue that was clarified at the meeting is that the purpose of Tasks 3 and 4 is to perform research into a formal verification/validation process that would fit with ESA’s software development methodologies, by developing a reference specification, identifying a formalism and process, and running a pilot feasibility study on sample code. The actual code to be subjected to verification i...

Journal: :Trans. Computational Science 2013
Ivan Polásek Marek Uhlar

The paper proposes a method for extracting, identifying and visualisation of topics, code tiers, users and authors in software projects. In addition to standard information retrieval techniques, we use AST for source code and WordNet ontology to enrich document vectors extracted from parsed code, LSI to reduce its dimensionality and the swarm intelligence in the bee behaviour inspired algorithm...

2011
Abdallah Qusef Gabriele Bavota Rocco Oliveto Andrea De Lucia David Binkley

Developers write and maintain unit tests continually in order to reflect changes in the production code and maintain an effective regression test suite. In addition, during refactoring developers must ensure that all unit tests continue to pass, so unit tests often need to be refactored together with the source code. Traceability links between application code and respective unit tests are extr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید