Sciweavers

2797 search results - page 232 / 560
» Code query by example
Sort
View
HICSS
2005
IEEE
189views Biometrics» more  HICSS 2005»
15 years 9 months ago
Contrasting Community Building in Sponsored and Community Founded Open Source Projects
Prior characterizations of open source projects have been based on the model of a community-founded project. More recently, a second model has emerged, where organizations spinout...
Joel West, Siobhan O'Mahony
RTSS
2005
IEEE
15 years 9 months ago
Quantifying the Gap between Embedded Control Models and Time-Triggered Implementations
Mapping a set of feedback control components to executable code introduces errors due to a variety of factors such as discretization, computational delays, and scheduling policies...
Hakan Yazarel, Antoine Girard, George J. Pappas, R...
118
Voted
HPCC
2005
Springer
15 years 9 months ago
Performance Analysis of Shared-Memory Parallel Applications Using Performance Properties
Tuning parallel code can be a time-consuming and difficult task. We present our approach to automate the performance analysis of OpenMP applications that is based on the notion of ...
Karl Fürlinger, Michael Gerndt
120
Voted
ICALP
2005
Springer
15 years 9 months ago
Simple Extractors via Constructions of Cryptographic Pseudo-random Generators
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-r...
Marius Zimand
141
Voted
ISW
2005
Springer
15 years 9 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech