Sciweavers

2947 search results - page 523 / 590
» Analyzing Program Analyses
Sort
View
COMPUTER
2006
98views more  COMPUTER 2006»
14 years 11 months ago
Componentization: The Visitor Example
: In software design, laziness is a virtue: it's better to reuse than to redo. Design patterns are a good illustration. Patterns, a major advance in software architecture, pro...
Bertrand Meyer, Karine Arnout
99
Voted
CORR
2006
Springer
100views Education» more  CORR 2006»
14 years 11 months ago
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
This paper describes an efficient implementation of binning for decode-and-forward (DF) in relay channels using lowdensity parity-check (LDPC) codes. Bilayer LDPC codes are devised...
Peyman Razaghi, Wei Yu
ECR
2006
107views more  ECR 2006»
14 years 11 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
EWC
2006
61views more  EWC 2006»
14 years 11 months ago
Embarrassingly parallel mesh refinement by edge subdivision
We have previously proposed a new technique for the communication-free adaptive refinement of tetrahedral meshes that works for all configurations. Implementations of the scheme mu...
David C. Thompson, Philippe P. Pébay
IJRR
2008
242views more  IJRR 2008»
14 years 11 months ago
Bilateral Symmetry Detection for Real-time Robotics Applications
Bilateral symmetry is a salient visual feature of many man-made objects. In this paper, we present research that use bilateral symmetry to identify, segment and track objects in re...
Wai Ho Li, Alan M. Zhang, Lindsay Kleeman