SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Billions of lines of code are currently running in Legacy systems, mainly running machine critical systems. Large organizations and as well as small organizations extensively rely on IT infrastructure as the backbone. The dependability on legacy Software systems to meet current demanding requirements is a major challenge to any IT profession. One of the top priority of any IT manager is to maintain the existing legacy system and optimize modules where required. Various techniques have been developed to determine the complexity of the modules as well as protocols have developed to assess the severity of a software problem. In this paper, it is proposed to study data mining algorithms in a multiclass scenario based on the severity of the error in the module.
Authors and Affiliations
M. V. P. Chandra Sekhara Rao , Dr. B. Raveendra Babu , Dr. A. Damodaram , Mrs. Aparna Chaparala
A Survey on Intrusion in Ad Hoc Networks and its Detection Measures
Ad hoc wireless networks are defined as the category of wireless networks that utilizes multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure hence, they are called infrast...
Adaption of Proactive Measure for Improving Performance Throughput Of TCP-Vegas
TCP (Transmission Control Protocol) throughput considered to be one of the most important aspects for analyzing the performance of TCP. This article represents a novel proactive technique based Acknowledge Delay which ai...
Zone Routing Protocol Using Anycast Addressing For Ad-Hoc Network
Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the Nneighbors using proactive...
ON THE DESIGN OF PROJECTIVE BINARY EDWARDS ELLIPTIC CURVES OVER GF (P) BENEFITING FROM MAPPING ELLIPTIC CURVES COMPUTATIONS TO VARIABLE DEGREE OF PARALLEL DESIGN
Finding multiplicative inverse (Modular Inversion) operation is the most time-consuming operation in Elliptic Curve Crypto-system (ECC) operations which affects the performance of ECC. Moreover, several factors that affe...
Simulation and Analysis of Digital Video Watermarking Using MPEG-2
Quantization Index Modulation (QIM) is an important method for embedding digital watermark signal with information. This technique achieves very efficient tradeoffs among watermark embedding rate, the amount of embedding...