Sciweavers

1629 search results - page 201 / 326
» Infeasible Code Detection
Sort
View
137
Voted
CHI
2001
ACM
16 years 1 months ago
Visual information foraging in a focus + context visualization
Eye tracking studies of the Hyperbolic Tree browser [10] suggest that visual search in focus+context displays is highly affected by information scent (i.e., local cues, such as te...
Peter Pirolli, Stuart K. Card, Mija M. Van Der Weg...
OSDI
2008
ACM
16 years 1 months ago
Digging for Data Structures
Because writing computer programs is hard, computer programmers are taught to use encapsulation and modularity to hide complexity and reduce the potential for errors. Their progra...
Anthony Cozzie, Frank Stratton, Hui Xue, Samuel T....
ICCD
2002
IEEE
98views Hardware» more  ICCD 2002»
15 years 10 months ago
Parallel Multiple-Symbol Variable-Length Decoding
In this paper, a parallel Variable-Length Decoding (VLD) scheme is introduced. The scheme is capable of decoding all the codewords in an N-bit buffer whose accumulated codelength ...
Jari Nikara, Stamatis Vassiliadis, Jarmo Takala, M...
SIGSOFT
2009
ACM
15 years 8 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
CODES
2008
IEEE
15 years 8 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano