Sciweavers

2018 search results - page 142 / 404
» Code Normal Forms
Sort
View
CHI
2009
ACM
16 years 3 months ago
Two studies of opportunistic programming: interleaving web foraging, learning, and writing code
This paper investigates the role of online resources in problem solving. We look specifically at how programmers--an exemplar form of knowledge workers--opportunistically interlea...
Joel Brandt, Philip J. Guo, Joel Lewenstein, Mira ...
145
Voted
CGO
2010
IEEE
15 years 9 months ago
Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code
We present a practical and scalable method for flow- and contextsensitive (FSCS) pointer analysis for C programs. Our method analyzes the pointers in a program level by level in ...
Hongtao Yu, Jingling Xue, Wei Huo, Xiaobing Feng 0...
135
Voted
CIKM
2009
Springer
15 years 9 months ago
Linear predictive coding representation of correlated mutation for protein sequence alignment
Background: Although both conservation and correlated mutation (CM) are important information reflecting the different sorts of context in multiple sequence alignment, most of ali...
Chan-seok Jeong, Dongsup Kim
112
Voted
USS
2008
15 years 4 months ago
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes
We introduce Scantegrity II, a practical enhancement for optical scan voting systems that achieves increased election integrity through the novel use of confirmation codes printed...
David Chaum, Richard Carback, Jeremy Clark, Aleksa...
159
Voted
DAIS
2006
15 years 4 months ago
A Code Migration Framework for AJAX Applications
AJAX (Asynchronous JavaScript and XML) defines a new paradigm for writing highly interactive web applications. Prominent web sites such as Google Maps have made AJAX popular. Writi...
Arno Puder