SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Billions of lines of code are currently running in Legacy systems, mainly running machine critical systems. Large organizations and as well as small organizations extensively rely on IT infrastructure as the backbone. The dependability on legacy Software systems to meet current demanding requirements is a major challenge to any IT profession. One of the top priority of any IT manager is to maintain the existing legacy system and optimize modules where required. Various techniques have been developed to determine the complexity of the modules as well as protocols have developed to assess the severity of a software problem. In this paper, it is proposed to study data mining algorithms in a multiclass scenario based on the severity of the error in the module.
Authors and Affiliations
M. V. P. Chandra Sekhara Rao , Dr. B. Raveendra Babu , Dr. A. Damodaram , Mrs. Aparna Chaparala
DEFINING RELATIONS IN PRECISIATION OF NATURAL LANGUAGE PROCESSING FOR SEMANTIC WEB
As we know people using semantic web which facilitates them to organize, locate and process content. The content access by people comfortably is the natural language which we all use in our day to day life. The Semantic...
The Reality of Software Reverse Engineering Education in the Jordanian Universities and How to improve it
In order to apply reverse engineering in software industry in an efficient and effective way there should be a high awareness in software reverse engineering concepts, approaches, and tools for employees in the software...
Comparing Neural Network Approach with N-Gram Approach for Text Categorization
This paper compares Neural network Approach with N-gram approach, for text categorization, and demonstrates that Neural Network approach is similar to the N-gram approach but with much less judging time. Both methods dem...
Architecture for Mobile based Face Detection / Recognition
In this paper a novel description of Face Detection-Recognition architecture through mobile devices is presented. Since the face detection/recognition is of importance in real-life scenarios, such as for authentication a...
Modeling of the Systems of Piloting In Training Institutions
From a globalization and complex environment .point of view the evaluation of the educational system turns out to be an imperative .The performance indicators allow to characterize the evolution of the educational system...