Sciweavers

66 search results - page 2 / 14
» Debugging through Evaluation Sequences: A Controlled Experim...
Sort
View
CCS
2008
ACM
13 years 7 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
PAKDD
2004
ACM
183views Data Mining» more  PAKDD 2004»
13 years 10 months ago
Constraint-Based Graph Clustering through Node Sequencing and Partitioning
This paper proposes a two-step graph partitioning method to discover constrained clusters with an objective function that follows the well-known minmax clustering principle. Compar...
Yu Qian, Kang Zhang, Wei Lai
BROADNETS
2006
IEEE
13 years 11 months ago
Experimental Validation of Middleware-based QoS Control in 802.11 Wireless Networks
Due to the shared medium nature of wireless networks, the uncertainties caused by collisions and interferences make the Quality of Service (QoS) issue harder than its wired counte...
Wenbo He, Hoang Nguyen, Klara Nahrstedt
ENTCS
2007
87views more  ENTCS 2007»
13 years 5 months ago
A Study on the Practicality of Poly-Controlled Partial Evaluation
Poly-controlled partial evaluation (PCPE) is a flexible approach for specializing logic programs, which has been recently proposed. It takes into account repertoires of global co...
Claudio Ochoa, Germán Puebla
ICSE
2005
IEEE-ACM
14 years 5 months ago
An empirical study of fault localization for end-user programmers
End users develop more software than any other group of programmers, using software authoring devices such as e-mail filtering editors, by-demonstration macro builders, and spread...
Joseph R. Ruthruff, Margaret M. Burnett, Gregg Rot...