Sciweavers

2018 search results - page 88 / 404
» Code Normal Forms
Sort
View
114
Voted
ASWEC
2005
IEEE
15 years 7 months ago
Virtual Machines, Managed Code and Component Technology
machines have been used as an implementation mechanism for programming languages for more than thirty years. In their latest incarnation execution engines based on virtual machine...
John Gough
100
Voted
SCAM
2008
IEEE
15 years 8 months ago
From Indentation Shapes to Code Structures
In a previous study, we showed that indentation was regular across multiple languages and the variance in the level of indentation of a block of revised code is correlated with me...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
118
Voted
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
15 years 4 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
121
Voted
ICASSP
2011
IEEE
14 years 5 months ago
Joint algorithm-architecture optimization of CABAC to increase speed and reduce area cost
To address the increasing demand for higher resolution and frame rates, processing speed (i.e. performance) and area cost need to be considered in the development of next generati...
Vivienne Sze, Anantha P. Chandrakasan
ICBA
2004
Springer
148views Biometrics» more  ICBA 2004»
15 years 7 months ago
Feature-Level Fusion for Effective Palmprint Authentication
Abstract. A feature-level fusion approach is proposed for improving the efficiency of palmprint identification. Multiple Gabor filters are employed to extract the phase information...
Adams Wai-Kin Kong, David Zhang