Sciweavers

1080 search results - page 45 / 216
» Improving Software Inspections by Using Reading Techniques
Sort
View
ALGORITHMICA
2005
195views more  ALGORITHMICA 2005»
14 years 9 months ago
Bit-Parallel Witnesses and Their Applications to Approximate String Matching
We present a new bit-parallel technique for approximate string matching. We build on two previous techniques. The first one, BPM [Myers, J. of the ACM, 1999], searches for a patte...
Heikki Hyyrö, Gonzalo Navarro
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 1 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
CC
2008
Springer
144views System Software» more  CC 2008»
14 years 11 months ago
Control Flow Emulation on Tiled SIMD Architectures
Heterogeneous multi-core and streaming architectures such as the GPU, Cell, ClearSpeed, and Imagine processors have better power/ performance ratios and memory bandwidth than tradi...
Ghulam Lashari, Ondrej Lhoták, Michael McCo...
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
15 years 4 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta
84
Voted
ICPP
2008
IEEE
15 years 4 months ago
Bridging the Gap Between Parallel File Systems and Local File Systems: A Case Study with PVFS
Parallel I/O plays an increasingly important role in today’s data intensive computing applications. While much attention has been paid to parallel read performance, most of this...
Peng Gu, Jun Wang, Robert Ross