Sciweavers

CASCON
2004
129views Education» more  CASCON 2004»
13 years 7 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy
CASCON
2004
129views Education» more  CASCON 2004»
13 years 7 months ago
Building predictors from vertically distributed data
Due in part to the large volume of data available today, but more importantly to privacy concerns, data are often distributed across institutional, geographical and organizational...
Sabine M. McConnell, David B. Skillicorn
CASCON
2004
127views Education» more  CASCON 2004»
13 years 7 months ago
A quantitative analysis of the performance impact of specialized bytecodes in java
Java is implemented by 201 bytecodes that serve the same purpose as assembler instructions while providing object-file platform independence. A collection of core bytecodes provid...
Ben Stephenson, Wade Holst
CASCON
2004
122views Education» more  CASCON 2004»
13 years 7 months ago
Evaluating the performance of user-space and kernel-space web servers
There has been much debate over the past few years about the practice of moving traditional user-space applications, such as web servers, into the kernel for better performance. R...
Amol Shukla, Lily Li, Anand Subramanian, Paul A. S...
CASCON
2004
110views Education» more  CASCON 2004»
13 years 7 months ago
Investigations in tree locking for compiled database applications
We report on initial experiments in tree locking schemes for compiled database applications. Such applications have a repository style of architecture in which a collection of sof...
Heng Yu, Grant E. Weddell
Education
Top of PageReset Settings