Sciweavers

6960 search results - page 1042 / 1392
» Continuity Analysis of Programs
Sort
View
149
Voted
HICSS
1995
IEEE
128views Biometrics» more  HICSS 1995»
15 years 8 months ago
Instruction Level Parallelism
Abstract. We reexamine the limits of parallelism available in programs, using runtime reconstruction of program data-flow graphs. While limits of parallelism have been examined in...
ISSTA
2010
ACM
15 years 6 months ago
The Google FindBugs fixit
In May 2009, Google conducted a company wide FindBugs “fixit”. Hundreds of engineers reviewed thousands of FindBugs warnings, and fixed or filed reports against many of the...
Nathaniel Ayewah, William Pugh
ACMSE
2006
ACM
15 years 6 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
CF
2006
ACM
15 years 6 months ago
Intermediately executed code is the key to find refactorings that improve temporal data locality
The growing speed gap between memory and processor makes an efficient use of the cache ever more important to reach high performance. One of the most important ways to improve cac...
Kristof Beyls, Erik H. D'Hollander
BMCBI
2007
148views more  BMCBI 2007»
15 years 4 months ago
Computation of significance scores of unweighted Gene Set Enrichment Analyses
Background: Gene Set Enrichment Analysis (GSEA) is a computational method for the statistical evaluation of sorted lists of genes or proteins. Originally GSEA was developed for in...
Andreas Keller, Christina Backes, Hans-Peter Lenho...
« Prev « First page 1042 / 1392 Last » Next »