Sciweavers

666 search results - page 105 / 134
» Component-Based Design and Analysis: A Case Study
Sort
View
PEPM
2009
ACM
15 years 4 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 3 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
ISOLA
2010
Springer
14 years 10 months ago
LivingKnowledge: Kernel Methods for Relational Learning and Semantic Modeling
Latest results of statistical learning theory have provided techniques such us pattern analysis and relational learning, which help in modeling system behavior, e.g. the semantics ...
Alessandro Moschitti
CSCW
2012
ACM
13 years 7 months ago
Between us and them: building connectedness within civic networks
Civic networks of community-based organizations face significant challenges in working together to combat issues facing their community (e.g., gang violence, sex trafficking). In ...
Jennifer Stoll, W. Keith Edwards, Kirsten A. Foot
FORMATS
2007
Springer
15 years 3 months ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...