Sciweavers

1629 search results - page 211 / 326
» Infeasible Code Detection
Sort
View
86
Voted
SIGCSE
2008
ACM
138views Education» more  SIGCSE 2008»
15 years 1 months ago
Debugging: the good, the bad, and the quirky -- a qualitative analysis of novices' strategies
A qualitative analysis of debugging strategies of novice Java programmers is presented. The study involved 21 CS2 students from seven universities in the U.S. and U.K. Subjects &q...
Laurie Murphy, Gary Lewandowski, Renée McCa...
SIGPLAN
2002
15 years 1 months ago
Embedding built-in tests in hot spots of an object-oriented framework
: Object-oriented frameworks require thorough testing as they are intended to be reused repeatedly in developing numerous applications. Moreover, whenever a framework is extended f...
Taewoong Jeon, Hyonwoo Seung, Sungyoung Lee
TIP
2002
99views more  TIP 2002»
15 years 1 months ago
Reconstructing images from their most singular fractal manifold
Real world images are complex objects, difficult to describe but at the same time possessing a high degree of redundancy. A very recent study [1] on the statistical properties of n...
Antonio Turiel, Angela del Pozo
CODES
2010
IEEE
14 years 11 months ago
Automatic memory partitioning: increasing memory parallelism via data structure partitioning
In high-level synthesis, pipelined designs are often restricted by the number of memory banks available to the synthesis system. Using multiple memory banks can improve the perfor...
Yosi Ben-Asher, Nadav Rotem
CBSE
2011
Springer
14 years 1 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...