Sciweavers

3456 search results - page 206 / 692
» Byte Code Engineering
Sort
View
SYNASC
2005
IEEE
98views Algorithms» more  SYNASC 2005»
15 years 9 months ago
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments
Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions...
Richard Wettel, Radu Marinescu
CORR
2007
Springer
120views Education» more  CORR 2007»
15 years 3 months ago
Performance Analysis of Algebraic Soft-Decision Decoding of Reed-Solomon Codes
Title of dissertation: PERFORMANCE ANALYSIS OF ALGEBRAIC SOFT-DECISION DECODING OF REED-SOLOMON CODES Andrew Duggan, Masters of Science, 2006 Thesis directed by: Professor Alexand...
Andrew Duggan, Alexander Barg
224
Voted
TSE
2010
140views more  TSE 2010»
15 years 1 months ago
Learning a Metric for Code Readability
—In this paper, we explore the concept of code readability and investigate its relation to software quality. With data collected from 120 human annotators, we derive associations...
Raymond P. L. Buse, Westley Weimer
TC
2010
14 years 10 months ago
Generating Reliable Code from Hybrid-Systems Models
Hybrid systems have emerged as an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. Under this paradigm, distr...
Madhukar Anand, Sebastian Fischmeister, Yerang Hur...
137
Voted
WORM
2003
15 years 4 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...