Sciweavers

3686 search results - page 366 / 738
» Comprehensive comprehensions
Sort
View
118
Voted
NDSS
2009
IEEE
15 years 10 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
113
Voted
ICRA
2009
IEEE
126views Robotics» more  ICRA 2009»
15 years 10 months ago
Leaving Flatland: Toward real-time 3D navigation
— We report our first experiences with Leaving Flatland, an exploratory project that studies the key challenges of closing the loop between autonomous perception and action on c...
Benoit Morisset, Radu Bogdan Rusu, Aravind Sundare...
108
Voted
ICSM
2009
IEEE
15 years 10 months ago
A theoretical and empirical study of EFSM dependence
Dependence analysis underpins many activities in software maintenance such as comprehension and impact analysis. As a result, dependence has been studied widely for programming la...
Kelly Androutsopoulos, Nicolas Gold, Mark Harman, ...
120
Voted
ICSM
2009
IEEE
15 years 10 months ago
Incremental call graph reanalysis for AspectJ software
Program call graph representation can be used to support many tasks in compiler optimization, program comprehension, and software maintenance. During software evolution, the call ...
Yu Lin, Sai Zhang, Jianjun Zhao
ICSM
2009
IEEE
15 years 10 months ago
Modularizing error recovery
Error recovery is an integral concern in compilers. Improving error recovery requires comprehension of a large and complex code base, in order to locate the places which raise err...
Jeeva Paudel, Christopher Dutchyn