SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Billions of lines of code are currently running in Legacy systems, mainly running machine critical systems. Large organizations and as well as small organizations extensively rely on IT infrastructure as the backbone. The dependability on legacy Software systems to meet current demanding requirements is a major challenge to any IT profession. One of the top priority of any IT manager is to maintain the existing legacy system and optimize modules where required. Various techniques have been developed to determine the complexity of the modules as well as protocols have developed to assess the severity of a software problem. In this paper, it is proposed to study data mining algorithms in a multiclass scenario based on the severity of the error in the module.
Authors and Affiliations
M. V. P. Chandra Sekhara Rao , Dr. B. Raveendra Babu , Dr. A. Damodaram , Mrs. Aparna Chaparala
An Approach to Active Queue Management in Computer Network
Active queue management is a key technique for reducing the packet drop rate in the internet. This packet dropping mechanism is used in a router to minimize congestion when the packets are dropped before queue gets full...
QUALITY OF SERVICE FOR MOBILE AD-HOC WIRELESS NETWORKS
Mobile ad-hoc network (MANET) is a wireless network without infrastructure. Nodes can commutate each other without central infrastructure; because they are self organised and self configurable with easy deployment. To co...
FCE: A QUALITY METRIC FOR COTS BASED SOFTWARE DESIGN
The software that is based on component is aimed at veloping large software systems thorough combining the xisting software components. Before integrate different omponents, first one need to identify whether functio...
Fractals Based Clustering for CBIR
Fractal based CBIR is based on the self similarity fundamentals of fractals. Mathematical and natural fractals are the shapes whose roughness and fragmentation neither tend to vanish, nor fluctuate, but remain essentiall...
SIGNATURE VERIFICATION
In this paper we present an off-line signature verification and recognition system based on a combination of features extracted such as blob features, average of radon transform, fusion of grid and global features using...