Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
Assessing Effectiveness of Test Suites: What Do We Know and What Should We Do?
- Peng Zhang,
- Yang Wang,
- Xutong Liu,
- Zeyu Lu,
- Yibiao Yang,
- Yanhui Li,
- Lin Chen,
- Ziyuan Wang,
- Chang-Ai Sun,
- Xiao Yu,
- Yuming Zhou
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 4Article No.: 86, Pages 1–32https://doi.org/10.1145/3635713Background. Software testing is a critical activity for ensuring the quality and reliability of software systems. To evaluate the effectiveness of different test suites, researchers have developed a variety of metrics. Problem. However, comparing these ...
- research-articleJuly 2022
Mutant Reduction Evaluation: What is There and What is Missing?
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 31, Issue 4Article No.: 69, Pages 1–46https://doi.org/10.1145/3522578Background. Mutation testing is a commonly used defect injection technique for evaluating the effectiveness of a test suite. However, it is usually computationally expensive. Therefore, many mutation reduction strategies, which aim to reduce the number of ...
- research-articleOctober 2020
OPHiForest: Order Preserving Hashing Based Isolation Forest for Robust and Scalable Anomaly Detection
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge ManagementPages 1655–1664https://doi.org/10.1145/3340531.3411988Anomaly detection is one of the most important data mining tasks in many real-life applications such as network intrusion detection for cybersecurity and medical diagnosis for healthcare. In the big data era, these applications demand fast and versatile ...
Fast and exact discrete geodesic computation based on triangle-oriented wavefront propagation
ACM Transactions on Graphics (TOG), Volume 35, Issue 4Article No.: 125, Pages 1–13https://doi.org/10.1145/2897824.2925930Computing discrete geodesic distance over triangle meshes is one of the fundamental problems in computational geometry and computer graphics. In this problem, an effective window pruning strategy can significantly affect the actual running time. Due to ...
- articleFebruary 2006
The Fluid Limit of an Overloaded Processor Sharing Queue
Mathematics of Operations Research (MOOR), Volume 31, Issue 2Pages 316–350https://doi.org/10.1287/moor.1050.0181This paper primarily concerns strictly supercritical fluid models, which arise as functional law of large numbers approximations for overloaded processor sharing queues. Analogous results for critical fluid models associated with heavily loaded ...
- ArticleMarch 1995
The AQUA Approach to Querying Lists and Trees in Object-Oriented Databases
Relational database systems and most object-oriented database systems provide support for queries. Usually these queries represent retrievals over sets or multisets. Many new applications for databases, such as multimedia systems and digital libraries, ...
- research-articleSeptember 1983
Interpolation-based index maintenance
AbstractA new interpolation-based order preserving hashing algorithm suitable for on-line maintenance of large dynamic external files under sequences of four kinds of operationsinsertion, update, deletion, andorthogonal range query is proposed. The scheme,...