Sciweavers

3404 search results - page 424 / 681
» C Programming Tutorial
Sort
View
ISW
2004
Springer
15 years 7 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
LPAR
2004
Springer
15 years 7 months ago
Second-Order Matching via Explicit Substitutions
Abstract. Matching is a basic operation extensively used in computation. Second-order matching, in particular, provides an adequate environment for expressing program transformatio...
Flávio L. C. de Moura, Fairouz Kamareddine,...
MICCAI
2004
Springer
15 years 7 months ago
Determining Malignancy of Brain Tumors by Analysis of Vessel Shape
Abstract. Vessels supplying malignant tumors are abnormally shaped. This paper describes a blinded study that assessed tumor malignancy by analyzing vessel shape within MR images o...
Elizabeth Bullitt, Inkyung Jung, Keith E. Muller, ...
PATMOS
2004
Springer
15 years 7 months ago
SoftExplorer: Estimation, Characterization, and Optimization of the Power and Energy Consumption at the Algorithmic Level
We present SoftExplorer, a tool to estimate and analyze the power and energy consumption of an algorithm from the C program. The consumption of every loop is analyzed, and the in...
Eric Senn, Johann Laurent, Nathalie Julien, Eric M...
APCSAC
2003
IEEE
15 years 7 months ago
Mapping Applications to a Coarse Grain Reconfigurable System
This paper introduces a method which can be used to map applications written in a high level source language program, like C, to a coarse grain reconfigurable architecture, MONTIU...
Yuanqing Guo, Gerard J. M. Smit, Hajo Broersma, Mi...